Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ZV2G9QQzlR.exe

Overview

General Information

Sample name:ZV2G9QQzlR.exe
renamed because original name is a hash value
Original sample name:8034e571846e99f8e3a7edf472dea0bc0b903201ca63a572dd74a2a637345f7d.exe
Analysis ID:1587974
MD5:97285a8373f6dc1d7250e24a46972849
SHA1:615cd2f15c22d33c15f19169dca5a4bbb5beb121
SHA256:8034e571846e99f8e3a7edf472dea0bc0b903201ca63a572dd74a2a637345f7d
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • ZV2G9QQzlR.exe (PID: 7752 cmdline: "C:\Users\user\Desktop\ZV2G9QQzlR.exe" MD5: 97285A8373F6DC1D7250E24A46972849)
    • svchost.exe (PID: 7808 cmdline: "C:\Users\user\Desktop\ZV2G9QQzlR.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.1552395026.0000000000310000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.1552577849.0000000002760000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      SourceRuleDescriptionAuthorStrings
      2.2.svchost.exe.310000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        2.2.svchost.exe.310000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\ZV2G9QQzlR.exe", CommandLine: "C:\Users\user\Desktop\ZV2G9QQzlR.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\ZV2G9QQzlR.exe", ParentImage: C:\Users\user\Desktop\ZV2G9QQzlR.exe, ParentProcessId: 7752, ParentProcessName: ZV2G9QQzlR.exe, ProcessCommandLine: "C:\Users\user\Desktop\ZV2G9QQzlR.exe", ProcessId: 7808, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\ZV2G9QQzlR.exe", CommandLine: "C:\Users\user\Desktop\ZV2G9QQzlR.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\ZV2G9QQzlR.exe", ParentImage: C:\Users\user\Desktop\ZV2G9QQzlR.exe, ParentProcessId: 7752, ParentProcessName: ZV2G9QQzlR.exe, ProcessCommandLine: "C:\Users\user\Desktop\ZV2G9QQzlR.exe", ProcessId: 7808, ProcessName: svchost.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: ZV2G9QQzlR.exeVirustotal: Detection: 69%Perma Link
          Source: ZV2G9QQzlR.exeReversingLabs: Detection: 76%
          Source: Yara matchFile source: 2.2.svchost.exe.310000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.310000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1552395026.0000000000310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1552577849.0000000002760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: ZV2G9QQzlR.exeJoe Sandbox ML: detected
          Source: ZV2G9QQzlR.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: wntdll.pdbUGP source: ZV2G9QQzlR.exe, 00000000.00000003.1342047668.0000000003970000.00000004.00001000.00020000.00000000.sdmp, ZV2G9QQzlR.exe, 00000000.00000003.1342920899.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1510534654.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1552949009.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1552949009.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1513120599.0000000002E00000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: ZV2G9QQzlR.exe, 00000000.00000003.1342047668.0000000003970000.00000004.00001000.00020000.00000000.sdmp, ZV2G9QQzlR.exe, 00000000.00000003.1342920899.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.1510534654.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1552949009.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1552949009.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1513120599.0000000002E00000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FB445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00FB445A
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FBC6D1 FindFirstFileW,FindClose,0_2_00FBC6D1
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FBC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00FBC75C
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FBEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FBEF95
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FBF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FBF0F2
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FBF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FBF3F3
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FB37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FB37EF
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FB3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FB3B12
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FBBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FBBCBC
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FC22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00FC22EE
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FC4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00FC4164
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FC4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00FC4164
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FC3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00FC3F66
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FB001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00FB001C
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FDCABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00FDCABC

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.310000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.310000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1552395026.0000000000310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1552577849.0000000002760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: This is a third-party compiled AutoIt script.0_2_00F53B3A
          Source: ZV2G9QQzlR.exeString found in binary or memory: This is a third-party compiled AutoIt script.
          Source: ZV2G9QQzlR.exe, 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_a24015f3-8
          Source: ZV2G9QQzlR.exe, 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_00eb9ec4-6
          Source: ZV2G9QQzlR.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_a93a8e20-e
          Source: ZV2G9QQzlR.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_b190920d-c
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0033C5B3 NtClose,2_2_0033C5B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072B60 NtClose,LdrInitializeThunk,2_2_03072B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03072DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030735C0 NtCreateMutant,LdrInitializeThunk,2_2_030735C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03074340 NtSetContextThread,2_2_03074340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03074650 NtSuspendThread,2_2_03074650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072B80 NtQueryInformationFile,2_2_03072B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072BA0 NtEnumerateValueKey,2_2_03072BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072BE0 NtQueryValueKey,2_2_03072BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072BF0 NtAllocateVirtualMemory,2_2_03072BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072AB0 NtWaitForSingleObject,2_2_03072AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072AD0 NtReadFile,2_2_03072AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072AF0 NtWriteFile,2_2_03072AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072F30 NtCreateSection,2_2_03072F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072F60 NtCreateProcessEx,2_2_03072F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072F90 NtProtectVirtualMemory,2_2_03072F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072FA0 NtQuerySection,2_2_03072FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072FB0 NtResumeThread,2_2_03072FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072FE0 NtCreateFile,2_2_03072FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072E30 NtWriteVirtualMemory,2_2_03072E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072E80 NtReadVirtualMemory,2_2_03072E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072EA0 NtAdjustPrivilegesToken,2_2_03072EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072EE0 NtQueueApcThread,2_2_03072EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072D00 NtSetInformationFile,2_2_03072D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072D10 NtMapViewOfSection,2_2_03072D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072D30 NtUnmapViewOfSection,2_2_03072D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072DB0 NtEnumerateKey,2_2_03072DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072DD0 NtDelayExecution,2_2_03072DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072C00 NtQueryInformationProcess,2_2_03072C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072C60 NtCreateKey,2_2_03072C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072C70 NtFreeVirtualMemory,2_2_03072C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072CA0 NtQueryInformationToken,2_2_03072CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072CC0 NtQueryVirtualMemory,2_2_03072CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072CF0 NtOpenProcess,2_2_03072CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03073010 NtOpenDirectoryObject,2_2_03073010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03073090 NtSetValueKey,2_2_03073090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030739B0 NtGetContextThread,2_2_030739B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03073D10 NtOpenProcessToken,2_2_03073D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03073D70 NtOpenThread,2_2_03073D70
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FBA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00FBA1EF
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FA8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00FA8310
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FB51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00FB51BD
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F7D9750_2_00F7D975
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F721C50_2_00F721C5
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F862D20_2_00F862D2
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FD03DA0_2_00FD03DA
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F8242E0_2_00F8242E
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F725FA0_2_00F725FA
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F666E10_2_00F666E1
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F5E6A00_2_00F5E6A0
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FAE6160_2_00FAE616
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F8878F0_2_00F8878F
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FB88890_2_00FB8889
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FD08570_2_00FD0857
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F868440_2_00F86844
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F688080_2_00F68808
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F7CB210_2_00F7CB21
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F86DB60_2_00F86DB6
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F66F9E0_2_00F66F9E
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F630300_2_00F63030
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F7F1D90_2_00F7F1D9
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F731870_2_00F73187
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F512870_2_00F51287
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F714840_2_00F71484
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F655200_2_00F65520
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F776960_2_00F77696
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F657600_2_00F65760
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F719780_2_00F71978
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F89AB50_2_00F89AB5
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F5FCE00_2_00F5FCE0
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FD7DDB0_2_00FD7DDB
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F7BDA60_2_00F7BDA6
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F71D900_2_00F71D90
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F63FE00_2_00F63FE0
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F5DF000_2_00F5DF00
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_012073B00_2_012073B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003130302_2_00313030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003110DC2_2_003110DC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0031E1332_2_0031E133
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0031E1272_2_0031E127
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0031E17C2_2_0031E17C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003111C02_2_003111C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0033EBA32_2_0033EBA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003124802_2_00312480
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0031FDD32_2_0031FDD3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0031FDCB2_2_0031FDCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0032677E2_2_0032677E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003127602_2_00312760
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003267832_2_00326783
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0031FFF32_2_0031FFF3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0031DFE32_2_0031DFE3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FA3522_2_030FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E3F02_2_0304E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031003E62_2_031003E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E02742_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C02C02_2_030C02C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030301002_2_03030100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DA1182_2_030DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C81582_2_030C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F41A22_2_030F41A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031001AA2_2_031001AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F81CC2_2_030F81CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D20002_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030647502_2_03064750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030407702_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303C7C02_2_0303C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305C6E02_2_0305C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030405352_2_03040535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031005912_2_03100591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E44202_2_030E4420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F24462_2_030F2446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EE4F62_2_030EE4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FAB402_2_030FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F6BD72_2_030F6BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA802_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030569622_2_03056962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A02_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0310A9A62_2_0310A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304A8402_2_0304A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030428402_2_03042840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030268B82_2_030268B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E8F02_2_0306E8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03082F282_2_03082F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03060F302_2_03060F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E2F302_2_030E2F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B4F402_2_030B4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BEFA02_2_030BEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03032FC82_2_03032FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304CFE02_2_0304CFE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FEE262_2_030FEE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040E592_2_03040E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052E902_2_03052E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FCE932_2_030FCE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FEEDB2_2_030FEEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304AD002_2_0304AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DCD1F2_2_030DCD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03058DBF2_2_03058DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303ADE02_2_0303ADE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040C002_2_03040C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0CB52_2_030E0CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030CF22_2_03030CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F132D2_2_030F132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302D34C2_2_0302D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0308739A2_2_0308739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030452A02_2_030452A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305B2C02_2_0305B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E12ED2_2_030E12ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307516C2_2_0307516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302F1722_2_0302F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0310B16B2_2_0310B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304B1B02_2_0304B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EF0CC2_2_030EF0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030470C02_2_030470C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F70E92_2_030F70E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FF0E02_2_030FF0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FF7B02_2_030FF7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F16CC2_2_030F16CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F75712_2_030F7571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DD5B02_2_030DD5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FF43F2_2_030FF43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030314602_2_03031460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FFB762_2_030FFB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305FB802_2_0305FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B5BF02_2_030B5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307DBF92_2_0307DBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FFA492_2_030FFA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F7A462_2_030F7A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B3A6C2_2_030B3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DDAAC2_2_030DDAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03085AA02_2_03085AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E1AA32_2_030E1AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EDAC62_2_030EDAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D59102_2_030D5910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030499502_2_03049950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305B9502_2_0305B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AD8002_2_030AD800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030438E02_2_030438E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FFF092_2_030FFF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03041F922_2_03041F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FFFB12_2_030FFFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03049EB02_2_03049EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03043D402_2_03043D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F1D5A2_2_030F1D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F7D732_2_030F7D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305FDC02_2_0305FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B9C322_2_030B9C32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FFCF22_2_030FFCF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030AEA12 appears 86 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0302B970 appears 280 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030BF290 appears 105 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03075130 appears 58 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03087E54 appears 102 times
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: String function: 00F78900 appears 42 times
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: String function: 00F70AE3 appears 70 times
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: String function: 00F57DE1 appears 35 times
          Source: ZV2G9QQzlR.exe, 00000000.00000003.1340971500.0000000003A93000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ZV2G9QQzlR.exe
          Source: ZV2G9QQzlR.exe, 00000000.00000003.1340290725.0000000003C3D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ZV2G9QQzlR.exe
          Source: ZV2G9QQzlR.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: classification engineClassification label: mal84.troj.evad.winEXE@3/2@0/0
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FBA06A GetLastError,FormatMessageW,0_2_00FBA06A
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FA81CB AdjustTokenPrivileges,CloseHandle,0_2_00FA81CB
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FA87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00FA87E1
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FBB3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00FBB3FB
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FCEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00FCEE0D
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FC83BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00FC83BB
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F54E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00F54E89
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeFile created: C:\Users\user\AppData\Local\Temp\aut967A.tmpJump to behavior
          Source: ZV2G9QQzlR.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: ZV2G9QQzlR.exeVirustotal: Detection: 69%
          Source: ZV2G9QQzlR.exeReversingLabs: Detection: 76%
          Source: unknownProcess created: C:\Users\user\Desktop\ZV2G9QQzlR.exe "C:\Users\user\Desktop\ZV2G9QQzlR.exe"
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\ZV2G9QQzlR.exe"
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\ZV2G9QQzlR.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeSection loaded: ntmarta.dllJump to behavior
          Source: ZV2G9QQzlR.exeStatic file information: File size 1203712 > 1048576
          Source: ZV2G9QQzlR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: ZV2G9QQzlR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: ZV2G9QQzlR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: ZV2G9QQzlR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: ZV2G9QQzlR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: ZV2G9QQzlR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: ZV2G9QQzlR.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: wntdll.pdbUGP source: ZV2G9QQzlR.exe, 00000000.00000003.1342047668.0000000003970000.00000004.00001000.00020000.00000000.sdmp, ZV2G9QQzlR.exe, 00000000.00000003.1342920899.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1510534654.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1552949009.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1552949009.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1513120599.0000000002E00000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: ZV2G9QQzlR.exe, 00000000.00000003.1342047668.0000000003970000.00000004.00001000.00020000.00000000.sdmp, ZV2G9QQzlR.exe, 00000000.00000003.1342920899.0000000003B10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.1510534654.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1552949009.000000000319E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1552949009.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1513120599.0000000002E00000.00000004.00000020.00020000.00000000.sdmp
          Source: ZV2G9QQzlR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: ZV2G9QQzlR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: ZV2G9QQzlR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: ZV2G9QQzlR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: ZV2G9QQzlR.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F54B37 LoadLibraryA,GetProcAddress,0_2_00F54B37
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F78945 push ecx; ret 0_2_00F78958
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_01207CD7 push ebp; iretd 0_2_01207CD8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0032E9E9 push edx; retf 2_2_0032E9EA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003132B0 push eax; ret 2_2_003132B2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0031D286 pushad ; ret 2_2_0031D29D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003222D5 pushad ; ret 2_2_003222FD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00318306 push ds; retf 2_2_00318307
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00314D95 push edx; retf 2_2_00314D96
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00328FFD push esi; iretd 2_2_00328FFE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030309AD push ecx; mov dword ptr [esp], ecx2_2_030309B6
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F548D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00F548D7
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FD5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00FD5376
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F73187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00F73187
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeAPI/Special instruction interceptor: Address: 1206FD4
          Source: ZV2G9QQzlR.exe, 00000000.00000003.1332655641.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, ZV2G9QQzlR.exe, 00000000.00000002.1345477826.0000000001240000.00000004.00000020.00020000.00000000.sdmp, ZV2G9QQzlR.exe, 00000000.00000003.1332758206.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXEAGE
          Source: ZV2G9QQzlR.exe, 00000000.00000003.1332655641.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, ZV2G9QQzlR.exe, 00000000.00000002.1345477826.0000000001240000.00000004.00000020.00020000.00000000.sdmp, ZV2G9QQzlR.exe, 00000000.00000003.1332758206.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307096E rdtsc 2_2_0307096E
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeAPI coverage: 4.3 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
          Source: C:\Windows\SysWOW64\svchost.exe TID: 7812Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FB445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00FB445A
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FBC6D1 FindFirstFileW,FindClose,0_2_00FBC6D1
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FBC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00FBC75C
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FBEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FBEF95
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FBF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00FBF0F2
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FBF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FBF3F3
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FB37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FB37EF
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FB3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00FB3B12
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FBBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00FBBCBC
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F549A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F549A0
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307096E rdtsc 2_2_0307096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00327713 LdrLoadDll,2_2_00327713
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FC3F09 BlockInput,0_2_00FC3F09
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F53B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F53B3A
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F85A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00F85A7C
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F54B37 LoadLibraryA,GetProcAddress,0_2_00F54B37
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_01207240 mov eax, dword ptr fs:[00000030h]0_2_01207240
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_012072A0 mov eax, dword ptr fs:[00000030h]0_2_012072A0
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_01205C20 mov eax, dword ptr fs:[00000030h]0_2_01205C20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A30B mov eax, dword ptr fs:[00000030h]2_2_0306A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A30B mov eax, dword ptr fs:[00000030h]2_2_0306A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A30B mov eax, dword ptr fs:[00000030h]2_2_0306A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302C310 mov ecx, dword ptr fs:[00000030h]2_2_0302C310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03050310 mov ecx, dword ptr fs:[00000030h]2_2_03050310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B2349 mov eax, dword ptr fs:[00000030h]2_2_030B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov eax, dword ptr fs:[00000030h]2_2_030B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov eax, dword ptr fs:[00000030h]2_2_030B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov eax, dword ptr fs:[00000030h]2_2_030B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov ecx, dword ptr fs:[00000030h]2_2_030B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov eax, dword ptr fs:[00000030h]2_2_030B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B035C mov eax, dword ptr fs:[00000030h]2_2_030B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FA352 mov eax, dword ptr fs:[00000030h]2_2_030FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D8350 mov ecx, dword ptr fs:[00000030h]2_2_030D8350
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D437C mov eax, dword ptr fs:[00000030h]2_2_030D437C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E388 mov eax, dword ptr fs:[00000030h]2_2_0302E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E388 mov eax, dword ptr fs:[00000030h]2_2_0302E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E388 mov eax, dword ptr fs:[00000030h]2_2_0302E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305438F mov eax, dword ptr fs:[00000030h]2_2_0305438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305438F mov eax, dword ptr fs:[00000030h]2_2_0305438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028397 mov eax, dword ptr fs:[00000030h]2_2_03028397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028397 mov eax, dword ptr fs:[00000030h]2_2_03028397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028397 mov eax, dword ptr fs:[00000030h]2_2_03028397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EC3CD mov eax, dword ptr fs:[00000030h]2_2_030EC3CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A3C0 mov eax, dword ptr fs:[00000030h]2_2_0303A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030383C0 mov eax, dword ptr fs:[00000030h]2_2_030383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030383C0 mov eax, dword ptr fs:[00000030h]2_2_030383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030383C0 mov eax, dword ptr fs:[00000030h]2_2_030383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030383C0 mov eax, dword ptr fs:[00000030h]2_2_030383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B63C0 mov eax, dword ptr fs:[00000030h]2_2_030B63C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE3DB mov eax, dword ptr fs:[00000030h]2_2_030DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE3DB mov eax, dword ptr fs:[00000030h]2_2_030DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE3DB mov ecx, dword ptr fs:[00000030h]2_2_030DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE3DB mov eax, dword ptr fs:[00000030h]2_2_030DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D43D4 mov eax, dword ptr fs:[00000030h]2_2_030D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D43D4 mov eax, dword ptr fs:[00000030h]2_2_030D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030403E9 mov eax, dword ptr fs:[00000030h]2_2_030403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E3F0 mov eax, dword ptr fs:[00000030h]2_2_0304E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E3F0 mov eax, dword ptr fs:[00000030h]2_2_0304E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E3F0 mov eax, dword ptr fs:[00000030h]2_2_0304E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030663FF mov eax, dword ptr fs:[00000030h]2_2_030663FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302823B mov eax, dword ptr fs:[00000030h]2_2_0302823B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B8243 mov eax, dword ptr fs:[00000030h]2_2_030B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B8243 mov ecx, dword ptr fs:[00000030h]2_2_030B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A250 mov eax, dword ptr fs:[00000030h]2_2_0302A250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036259 mov eax, dword ptr fs:[00000030h]2_2_03036259
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EA250 mov eax, dword ptr fs:[00000030h]2_2_030EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EA250 mov eax, dword ptr fs:[00000030h]2_2_030EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034260 mov eax, dword ptr fs:[00000030h]2_2_03034260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034260 mov eax, dword ptr fs:[00000030h]2_2_03034260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034260 mov eax, dword ptr fs:[00000030h]2_2_03034260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302826B mov eax, dword ptr fs:[00000030h]2_2_0302826B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E0274 mov eax, dword ptr fs:[00000030h]2_2_030E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E284 mov eax, dword ptr fs:[00000030h]2_2_0306E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E284 mov eax, dword ptr fs:[00000030h]2_2_0306E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B0283 mov eax, dword ptr fs:[00000030h]2_2_030B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B0283 mov eax, dword ptr fs:[00000030h]2_2_030B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B0283 mov eax, dword ptr fs:[00000030h]2_2_030B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030402A0 mov eax, dword ptr fs:[00000030h]2_2_030402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030402A0 mov eax, dword ptr fs:[00000030h]2_2_030402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov eax, dword ptr fs:[00000030h]2_2_030C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov ecx, dword ptr fs:[00000030h]2_2_030C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov eax, dword ptr fs:[00000030h]2_2_030C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov eax, dword ptr fs:[00000030h]2_2_030C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov eax, dword ptr fs:[00000030h]2_2_030C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C62A0 mov eax, dword ptr fs:[00000030h]2_2_030C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A2C3 mov eax, dword ptr fs:[00000030h]2_2_0303A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A2C3 mov eax, dword ptr fs:[00000030h]2_2_0303A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A2C3 mov eax, dword ptr fs:[00000030h]2_2_0303A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A2C3 mov eax, dword ptr fs:[00000030h]2_2_0303A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A2C3 mov eax, dword ptr fs:[00000030h]2_2_0303A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030402E1 mov eax, dword ptr fs:[00000030h]2_2_030402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030402E1 mov eax, dword ptr fs:[00000030h]2_2_030402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030402E1 mov eax, dword ptr fs:[00000030h]2_2_030402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov ecx, dword ptr fs:[00000030h]2_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov ecx, dword ptr fs:[00000030h]2_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov ecx, dword ptr fs:[00000030h]2_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov eax, dword ptr fs:[00000030h]2_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DE10E mov ecx, dword ptr fs:[00000030h]2_2_030DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DA118 mov ecx, dword ptr fs:[00000030h]2_2_030DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DA118 mov eax, dword ptr fs:[00000030h]2_2_030DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DA118 mov eax, dword ptr fs:[00000030h]2_2_030DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DA118 mov eax, dword ptr fs:[00000030h]2_2_030DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F0115 mov eax, dword ptr fs:[00000030h]2_2_030F0115
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03060124 mov eax, dword ptr fs:[00000030h]2_2_03060124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C4144 mov eax, dword ptr fs:[00000030h]2_2_030C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C4144 mov eax, dword ptr fs:[00000030h]2_2_030C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C4144 mov ecx, dword ptr fs:[00000030h]2_2_030C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C4144 mov eax, dword ptr fs:[00000030h]2_2_030C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C4144 mov eax, dword ptr fs:[00000030h]2_2_030C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302C156 mov eax, dword ptr fs:[00000030h]2_2_0302C156
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C8158 mov eax, dword ptr fs:[00000030h]2_2_030C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036154 mov eax, dword ptr fs:[00000030h]2_2_03036154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036154 mov eax, dword ptr fs:[00000030h]2_2_03036154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03070185 mov eax, dword ptr fs:[00000030h]2_2_03070185
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EC188 mov eax, dword ptr fs:[00000030h]2_2_030EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EC188 mov eax, dword ptr fs:[00000030h]2_2_030EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D4180 mov eax, dword ptr fs:[00000030h]2_2_030D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D4180 mov eax, dword ptr fs:[00000030h]2_2_030D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B019F mov eax, dword ptr fs:[00000030h]2_2_030B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B019F mov eax, dword ptr fs:[00000030h]2_2_030B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B019F mov eax, dword ptr fs:[00000030h]2_2_030B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B019F mov eax, dword ptr fs:[00000030h]2_2_030B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A197 mov eax, dword ptr fs:[00000030h]2_2_0302A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A197 mov eax, dword ptr fs:[00000030h]2_2_0302A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A197 mov eax, dword ptr fs:[00000030h]2_2_0302A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F61C3 mov eax, dword ptr fs:[00000030h]2_2_030F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F61C3 mov eax, dword ptr fs:[00000030h]2_2_030F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE1D0 mov eax, dword ptr fs:[00000030h]2_2_030AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE1D0 mov eax, dword ptr fs:[00000030h]2_2_030AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_030AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE1D0 mov eax, dword ptr fs:[00000030h]2_2_030AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE1D0 mov eax, dword ptr fs:[00000030h]2_2_030AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031061E5 mov eax, dword ptr fs:[00000030h]2_2_031061E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030601F8 mov eax, dword ptr fs:[00000030h]2_2_030601F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B4000 mov ecx, dword ptr fs:[00000030h]2_2_030B4000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D2000 mov eax, dword ptr fs:[00000030h]2_2_030D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E016 mov eax, dword ptr fs:[00000030h]2_2_0304E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E016 mov eax, dword ptr fs:[00000030h]2_2_0304E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E016 mov eax, dword ptr fs:[00000030h]2_2_0304E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E016 mov eax, dword ptr fs:[00000030h]2_2_0304E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A020 mov eax, dword ptr fs:[00000030h]2_2_0302A020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302C020 mov eax, dword ptr fs:[00000030h]2_2_0302C020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6030 mov eax, dword ptr fs:[00000030h]2_2_030C6030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03032050 mov eax, dword ptr fs:[00000030h]2_2_03032050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6050 mov eax, dword ptr fs:[00000030h]2_2_030B6050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305C073 mov eax, dword ptr fs:[00000030h]2_2_0305C073
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303208A mov eax, dword ptr fs:[00000030h]2_2_0303208A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C80A8 mov eax, dword ptr fs:[00000030h]2_2_030C80A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F60B8 mov eax, dword ptr fs:[00000030h]2_2_030F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F60B8 mov ecx, dword ptr fs:[00000030h]2_2_030F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B20DE mov eax, dword ptr fs:[00000030h]2_2_030B20DE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0302A0E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030380E9 mov eax, dword ptr fs:[00000030h]2_2_030380E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B60E0 mov eax, dword ptr fs:[00000030h]2_2_030B60E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302C0F0 mov eax, dword ptr fs:[00000030h]2_2_0302C0F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030720F0 mov ecx, dword ptr fs:[00000030h]2_2_030720F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C700 mov eax, dword ptr fs:[00000030h]2_2_0306C700
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030710 mov eax, dword ptr fs:[00000030h]2_2_03030710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03060710 mov eax, dword ptr fs:[00000030h]2_2_03060710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C720 mov eax, dword ptr fs:[00000030h]2_2_0306C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C720 mov eax, dword ptr fs:[00000030h]2_2_0306C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306273C mov eax, dword ptr fs:[00000030h]2_2_0306273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306273C mov ecx, dword ptr fs:[00000030h]2_2_0306273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306273C mov eax, dword ptr fs:[00000030h]2_2_0306273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AC730 mov eax, dword ptr fs:[00000030h]2_2_030AC730
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306674D mov esi, dword ptr fs:[00000030h]2_2_0306674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306674D mov eax, dword ptr fs:[00000030h]2_2_0306674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306674D mov eax, dword ptr fs:[00000030h]2_2_0306674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030750 mov eax, dword ptr fs:[00000030h]2_2_03030750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BE75D mov eax, dword ptr fs:[00000030h]2_2_030BE75D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072750 mov eax, dword ptr fs:[00000030h]2_2_03072750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072750 mov eax, dword ptr fs:[00000030h]2_2_03072750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B4755 mov eax, dword ptr fs:[00000030h]2_2_030B4755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038770 mov eax, dword ptr fs:[00000030h]2_2_03038770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040770 mov eax, dword ptr fs:[00000030h]2_2_03040770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D678E mov eax, dword ptr fs:[00000030h]2_2_030D678E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030307AF mov eax, dword ptr fs:[00000030h]2_2_030307AF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E47A0 mov eax, dword ptr fs:[00000030h]2_2_030E47A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303C7C0 mov eax, dword ptr fs:[00000030h]2_2_0303C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B07C3 mov eax, dword ptr fs:[00000030h]2_2_030B07C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030527ED mov eax, dword ptr fs:[00000030h]2_2_030527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030527ED mov eax, dword ptr fs:[00000030h]2_2_030527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030527ED mov eax, dword ptr fs:[00000030h]2_2_030527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BE7E1 mov eax, dword ptr fs:[00000030h]2_2_030BE7E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030347FB mov eax, dword ptr fs:[00000030h]2_2_030347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030347FB mov eax, dword ptr fs:[00000030h]2_2_030347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE609 mov eax, dword ptr fs:[00000030h]2_2_030AE609
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03072619 mov eax, dword ptr fs:[00000030h]2_2_03072619
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304E627 mov eax, dword ptr fs:[00000030h]2_2_0304E627
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03066620 mov eax, dword ptr fs:[00000030h]2_2_03066620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03068620 mov eax, dword ptr fs:[00000030h]2_2_03068620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303262C mov eax, dword ptr fs:[00000030h]2_2_0303262C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0304C640 mov eax, dword ptr fs:[00000030h]2_2_0304C640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F866E mov eax, dword ptr fs:[00000030h]2_2_030F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F866E mov eax, dword ptr fs:[00000030h]2_2_030F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A660 mov eax, dword ptr fs:[00000030h]2_2_0306A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A660 mov eax, dword ptr fs:[00000030h]2_2_0306A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03062674 mov eax, dword ptr fs:[00000030h]2_2_03062674
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034690 mov eax, dword ptr fs:[00000030h]2_2_03034690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034690 mov eax, dword ptr fs:[00000030h]2_2_03034690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C6A6 mov eax, dword ptr fs:[00000030h]2_2_0306C6A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030666B0 mov eax, dword ptr fs:[00000030h]2_2_030666B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0306A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A6C7 mov eax, dword ptr fs:[00000030h]2_2_0306A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE6F2 mov eax, dword ptr fs:[00000030h]2_2_030AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE6F2 mov eax, dword ptr fs:[00000030h]2_2_030AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE6F2 mov eax, dword ptr fs:[00000030h]2_2_030AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE6F2 mov eax, dword ptr fs:[00000030h]2_2_030AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B06F1 mov eax, dword ptr fs:[00000030h]2_2_030B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B06F1 mov eax, dword ptr fs:[00000030h]2_2_030B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6500 mov eax, dword ptr fs:[00000030h]2_2_030C6500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104500 mov eax, dword ptr fs:[00000030h]2_2_03104500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040535 mov eax, dword ptr fs:[00000030h]2_2_03040535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E53E mov eax, dword ptr fs:[00000030h]2_2_0305E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E53E mov eax, dword ptr fs:[00000030h]2_2_0305E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E53E mov eax, dword ptr fs:[00000030h]2_2_0305E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E53E mov eax, dword ptr fs:[00000030h]2_2_0305E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E53E mov eax, dword ptr fs:[00000030h]2_2_0305E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038550 mov eax, dword ptr fs:[00000030h]2_2_03038550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038550 mov eax, dword ptr fs:[00000030h]2_2_03038550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306656A mov eax, dword ptr fs:[00000030h]2_2_0306656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306656A mov eax, dword ptr fs:[00000030h]2_2_0306656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306656A mov eax, dword ptr fs:[00000030h]2_2_0306656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03032582 mov eax, dword ptr fs:[00000030h]2_2_03032582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03032582 mov ecx, dword ptr fs:[00000030h]2_2_03032582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03064588 mov eax, dword ptr fs:[00000030h]2_2_03064588
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E59C mov eax, dword ptr fs:[00000030h]2_2_0306E59C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B05A7 mov eax, dword ptr fs:[00000030h]2_2_030B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B05A7 mov eax, dword ptr fs:[00000030h]2_2_030B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B05A7 mov eax, dword ptr fs:[00000030h]2_2_030B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030545B1 mov eax, dword ptr fs:[00000030h]2_2_030545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030545B1 mov eax, dword ptr fs:[00000030h]2_2_030545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E5CF mov eax, dword ptr fs:[00000030h]2_2_0306E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E5CF mov eax, dword ptr fs:[00000030h]2_2_0306E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030365D0 mov eax, dword ptr fs:[00000030h]2_2_030365D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A5D0 mov eax, dword ptr fs:[00000030h]2_2_0306A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A5D0 mov eax, dword ptr fs:[00000030h]2_2_0306A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E5E7 mov eax, dword ptr fs:[00000030h]2_2_0305E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030325E0 mov eax, dword ptr fs:[00000030h]2_2_030325E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C5ED mov eax, dword ptr fs:[00000030h]2_2_0306C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C5ED mov eax, dword ptr fs:[00000030h]2_2_0306C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03068402 mov eax, dword ptr fs:[00000030h]2_2_03068402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03068402 mov eax, dword ptr fs:[00000030h]2_2_03068402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03068402 mov eax, dword ptr fs:[00000030h]2_2_03068402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E420 mov eax, dword ptr fs:[00000030h]2_2_0302E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E420 mov eax, dword ptr fs:[00000030h]2_2_0302E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302E420 mov eax, dword ptr fs:[00000030h]2_2_0302E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302C427 mov eax, dword ptr fs:[00000030h]2_2_0302C427
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B6420 mov eax, dword ptr fs:[00000030h]2_2_030B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A430 mov eax, dword ptr fs:[00000030h]2_2_0306A430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306E443 mov eax, dword ptr fs:[00000030h]2_2_0306E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EA456 mov eax, dword ptr fs:[00000030h]2_2_030EA456
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302645D mov eax, dword ptr fs:[00000030h]2_2_0302645D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305245A mov eax, dword ptr fs:[00000030h]2_2_0305245A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BC460 mov ecx, dword ptr fs:[00000030h]2_2_030BC460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305A470 mov eax, dword ptr fs:[00000030h]2_2_0305A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305A470 mov eax, dword ptr fs:[00000030h]2_2_0305A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305A470 mov eax, dword ptr fs:[00000030h]2_2_0305A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030EA49A mov eax, dword ptr fs:[00000030h]2_2_030EA49A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030364AB mov eax, dword ptr fs:[00000030h]2_2_030364AB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030644B0 mov ecx, dword ptr fs:[00000030h]2_2_030644B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BA4B0 mov eax, dword ptr fs:[00000030h]2_2_030BA4B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030304E5 mov ecx, dword ptr fs:[00000030h]2_2_030304E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AEB1D mov eax, dword ptr fs:[00000030h]2_2_030AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305EB20 mov eax, dword ptr fs:[00000030h]2_2_0305EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305EB20 mov eax, dword ptr fs:[00000030h]2_2_0305EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F8B28 mov eax, dword ptr fs:[00000030h]2_2_030F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030F8B28 mov eax, dword ptr fs:[00000030h]2_2_030F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E4B4B mov eax, dword ptr fs:[00000030h]2_2_030E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E4B4B mov eax, dword ptr fs:[00000030h]2_2_030E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6B40 mov eax, dword ptr fs:[00000030h]2_2_030C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6B40 mov eax, dword ptr fs:[00000030h]2_2_030C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FAB40 mov eax, dword ptr fs:[00000030h]2_2_030FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D8B42 mov eax, dword ptr fs:[00000030h]2_2_030D8B42
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DEB50 mov eax, dword ptr fs:[00000030h]2_2_030DEB50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302CB7E mov eax, dword ptr fs:[00000030h]2_2_0302CB7E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040BBE mov eax, dword ptr fs:[00000030h]2_2_03040BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040BBE mov eax, dword ptr fs:[00000030h]2_2_03040BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E4BB0 mov eax, dword ptr fs:[00000030h]2_2_030E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E4BB0 mov eax, dword ptr fs:[00000030h]2_2_030E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03050BCB mov eax, dword ptr fs:[00000030h]2_2_03050BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03050BCB mov eax, dword ptr fs:[00000030h]2_2_03050BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03050BCB mov eax, dword ptr fs:[00000030h]2_2_03050BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030BCD mov eax, dword ptr fs:[00000030h]2_2_03030BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030BCD mov eax, dword ptr fs:[00000030h]2_2_03030BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030BCD mov eax, dword ptr fs:[00000030h]2_2_03030BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DEBD0 mov eax, dword ptr fs:[00000030h]2_2_030DEBD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038BF0 mov eax, dword ptr fs:[00000030h]2_2_03038BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038BF0 mov eax, dword ptr fs:[00000030h]2_2_03038BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038BF0 mov eax, dword ptr fs:[00000030h]2_2_03038BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305EBFC mov eax, dword ptr fs:[00000030h]2_2_0305EBFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BCBF0 mov eax, dword ptr fs:[00000030h]2_2_030BCBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BCA11 mov eax, dword ptr fs:[00000030h]2_2_030BCA11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CA24 mov eax, dword ptr fs:[00000030h]2_2_0306CA24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305EA2E mov eax, dword ptr fs:[00000030h]2_2_0305EA2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03054A35 mov eax, dword ptr fs:[00000030h]2_2_03054A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03054A35 mov eax, dword ptr fs:[00000030h]2_2_03054A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CA38 mov eax, dword ptr fs:[00000030h]2_2_0306CA38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03036A50 mov eax, dword ptr fs:[00000030h]2_2_03036A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040A5B mov eax, dword ptr fs:[00000030h]2_2_03040A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03040A5B mov eax, dword ptr fs:[00000030h]2_2_03040A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CA6F mov eax, dword ptr fs:[00000030h]2_2_0306CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CA6F mov eax, dword ptr fs:[00000030h]2_2_0306CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CA6F mov eax, dword ptr fs:[00000030h]2_2_0306CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030DEA60 mov eax, dword ptr fs:[00000030h]2_2_030DEA60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030ACA72 mov eax, dword ptr fs:[00000030h]2_2_030ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030ACA72 mov eax, dword ptr fs:[00000030h]2_2_030ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303EA80 mov eax, dword ptr fs:[00000030h]2_2_0303EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03104A80 mov eax, dword ptr fs:[00000030h]2_2_03104A80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03068A90 mov edx, dword ptr fs:[00000030h]2_2_03068A90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038AA0 mov eax, dword ptr fs:[00000030h]2_2_03038AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03038AA0 mov eax, dword ptr fs:[00000030h]2_2_03038AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03086AA4 mov eax, dword ptr fs:[00000030h]2_2_03086AA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03086ACC mov eax, dword ptr fs:[00000030h]2_2_03086ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03086ACC mov eax, dword ptr fs:[00000030h]2_2_03086ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03086ACC mov eax, dword ptr fs:[00000030h]2_2_03086ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030AD0 mov eax, dword ptr fs:[00000030h]2_2_03030AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03064AD0 mov eax, dword ptr fs:[00000030h]2_2_03064AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03064AD0 mov eax, dword ptr fs:[00000030h]2_2_03064AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306AAEE mov eax, dword ptr fs:[00000030h]2_2_0306AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306AAEE mov eax, dword ptr fs:[00000030h]2_2_0306AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE908 mov eax, dword ptr fs:[00000030h]2_2_030AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030AE908 mov eax, dword ptr fs:[00000030h]2_2_030AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BC912 mov eax, dword ptr fs:[00000030h]2_2_030BC912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028918 mov eax, dword ptr fs:[00000030h]2_2_03028918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03028918 mov eax, dword ptr fs:[00000030h]2_2_03028918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B892A mov eax, dword ptr fs:[00000030h]2_2_030B892A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C892B mov eax, dword ptr fs:[00000030h]2_2_030C892B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B0946 mov eax, dword ptr fs:[00000030h]2_2_030B0946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03056962 mov eax, dword ptr fs:[00000030h]2_2_03056962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03056962 mov eax, dword ptr fs:[00000030h]2_2_03056962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03056962 mov eax, dword ptr fs:[00000030h]2_2_03056962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307096E mov eax, dword ptr fs:[00000030h]2_2_0307096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307096E mov edx, dword ptr fs:[00000030h]2_2_0307096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0307096E mov eax, dword ptr fs:[00000030h]2_2_0307096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D4978 mov eax, dword ptr fs:[00000030h]2_2_030D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D4978 mov eax, dword ptr fs:[00000030h]2_2_030D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BC97C mov eax, dword ptr fs:[00000030h]2_2_030BC97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030429A0 mov eax, dword ptr fs:[00000030h]2_2_030429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030309AD mov eax, dword ptr fs:[00000030h]2_2_030309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030309AD mov eax, dword ptr fs:[00000030h]2_2_030309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B89B3 mov esi, dword ptr fs:[00000030h]2_2_030B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B89B3 mov eax, dword ptr fs:[00000030h]2_2_030B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B89B3 mov eax, dword ptr fs:[00000030h]2_2_030B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C69C0 mov eax, dword ptr fs:[00000030h]2_2_030C69C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0303A9D0 mov eax, dword ptr fs:[00000030h]2_2_0303A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030649D0 mov eax, dword ptr fs:[00000030h]2_2_030649D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FA9D3 mov eax, dword ptr fs:[00000030h]2_2_030FA9D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BE9E0 mov eax, dword ptr fs:[00000030h]2_2_030BE9E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030629F9 mov eax, dword ptr fs:[00000030h]2_2_030629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030629F9 mov eax, dword ptr fs:[00000030h]2_2_030629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BC810 mov eax, dword ptr fs:[00000030h]2_2_030BC810
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov eax, dword ptr fs:[00000030h]2_2_03052835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov eax, dword ptr fs:[00000030h]2_2_03052835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov eax, dword ptr fs:[00000030h]2_2_03052835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov ecx, dword ptr fs:[00000030h]2_2_03052835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov eax, dword ptr fs:[00000030h]2_2_03052835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03052835 mov eax, dword ptr fs:[00000030h]2_2_03052835
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306A830 mov eax, dword ptr fs:[00000030h]2_2_0306A830
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D483A mov eax, dword ptr fs:[00000030h]2_2_030D483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D483A mov eax, dword ptr fs:[00000030h]2_2_030D483A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03042840 mov ecx, dword ptr fs:[00000030h]2_2_03042840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03060854 mov eax, dword ptr fs:[00000030h]2_2_03060854
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034859 mov eax, dword ptr fs:[00000030h]2_2_03034859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03034859 mov eax, dword ptr fs:[00000030h]2_2_03034859
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BE872 mov eax, dword ptr fs:[00000030h]2_2_030BE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BE872 mov eax, dword ptr fs:[00000030h]2_2_030BE872
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6870 mov eax, dword ptr fs:[00000030h]2_2_030C6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030C6870 mov eax, dword ptr fs:[00000030h]2_2_030C6870
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03030887 mov eax, dword ptr fs:[00000030h]2_2_03030887
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030BC89D mov eax, dword ptr fs:[00000030h]2_2_030BC89D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305E8C0 mov eax, dword ptr fs:[00000030h]2_2_0305E8C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030FA8E4 mov eax, dword ptr fs:[00000030h]2_2_030FA8E4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C8F9 mov eax, dword ptr fs:[00000030h]2_2_0306C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306C8F9 mov eax, dword ptr fs:[00000030h]2_2_0306C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030E6F00 mov eax, dword ptr fs:[00000030h]2_2_030E6F00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03032F12 mov eax, dword ptr fs:[00000030h]2_2_03032F12
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0306CF1F mov eax, dword ptr fs:[00000030h]2_2_0306CF1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0305EF28 mov eax, dword ptr fs:[00000030h]2_2_0305EF28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B4F40 mov eax, dword ptr fs:[00000030h]2_2_030B4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B4F40 mov eax, dword ptr fs:[00000030h]2_2_030B4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B4F40 mov eax, dword ptr fs:[00000030h]2_2_030B4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030B4F40 mov eax, dword ptr fs:[00000030h]2_2_030B4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030D4F42 mov eax, dword ptr fs:[00000030h]2_2_030D4F42
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302CF50 mov eax, dword ptr fs:[00000030h]2_2_0302CF50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0302CF50 mov eax, dword ptr fs:[00000030h]2_2_0302CF50
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FA80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_00FA80A9
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F7A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F7A155
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F7A124 SetUnhandledExceptionFilter,0_2_00F7A124

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 4E3008Jump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FA87B1 LogonUserW,0_2_00FA87B1
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F53B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F53B3A
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F548D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00F548D7
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FB4C7F mouse_event,0_2_00FB4C7F
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\ZV2G9QQzlR.exe"Jump to behavior
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FA7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00FA7CAF
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FA874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00FA874B
          Source: ZV2G9QQzlR.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
          Source: ZV2G9QQzlR.exeBinary or memory string: Shell_TrayWnd
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F7862B cpuid 0_2_00F7862B
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F84E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00F84E87
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F91E06 GetUserNameW,0_2_00F91E06
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F83F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00F83F3A
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00F549A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00F549A0

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.310000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.310000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1552395026.0000000000310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1552577849.0000000002760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: ZV2G9QQzlR.exeBinary or memory string: WIN_81
          Source: ZV2G9QQzlR.exeBinary or memory string: WIN_XP
          Source: ZV2G9QQzlR.exeBinary or memory string: WIN_XPe
          Source: ZV2G9QQzlR.exeBinary or memory string: WIN_VISTA
          Source: ZV2G9QQzlR.exeBinary or memory string: WIN_7
          Source: ZV2G9QQzlR.exeBinary or memory string: WIN_8
          Source: ZV2G9QQzlR.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 2.2.svchost.exe.310000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.svchost.exe.310000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.1552395026.0000000000310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1552577849.0000000002760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FC6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00FC6283
          Source: C:\Users\user\Desktop\ZV2G9QQzlR.exeCode function: 0_2_00FC6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00FC6747
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          1
          Native API
          2
          Valid Accounts
          2
          Valid Accounts
          2
          Valid Accounts
          21
          Input Capture
          2
          System Time Discovery
          Remote Services21
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          LSASS Memory25
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
          Access Token Manipulation
          2
          Virtualization/Sandbox Evasion
          Security Account Manager2
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares3
          Clipboard Data
          SteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook212
          Process Injection
          21
          Access Token Manipulation
          NTDS3
          Process Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
          DLL Side-Loading
          212
          Process Injection
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials1
          Account Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Obfuscated Files or Information
          DCSync1
          System Owner/User Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc Filesystem1
          File and Directory Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow115
          System Information Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          ZV2G9QQzlR.exe69%VirustotalBrowse
          ZV2G9QQzlR.exe76%ReversingLabsWin32.Trojan.AutoitInject
          ZV2G9QQzlR.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          s-part-0017.t-0009.t-msedge.net
          13.107.246.45
          truefalse
            high
            No contacted IP infos
            Joe Sandbox version:42.0.0 Malachite
            Analysis ID:1587974
            Start date and time:2025-01-10 20:02:42 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 30s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:6
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:ZV2G9QQzlR.exe
            renamed because original name is a hash value
            Original Sample Name:8034e571846e99f8e3a7edf472dea0bc0b903201ca63a572dd74a2a637345f7d.exe
            Detection:MAL
            Classification:mal84.troj.evad.winEXE@3/2@0/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 97%
            • Number of executed functions: 46
            • Number of non-executed functions: 277
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Stop behavior analysis, all processes terminated
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
            • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56
            • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing disassembly code.
            TimeTypeDescription
            14:04:00API Interceptor3x Sleep call for process: svchost.exe modified
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            s-part-0017.t-0009.t-msedge.netOVZizpEU7Q.exeGet hashmaliciousFormBookBrowse
            • 13.107.246.45
            xrAlbTvRsz.exeGet hashmaliciousFormBookBrowse
            • 13.107.246.45
            Xf3rn1smZw.exeGet hashmaliciousRedLineBrowse
            • 13.107.246.45
            ThBJg59JRC.exeGet hashmaliciousFormBookBrowse
            • 13.107.246.45
            293816234142143228.jsGet hashmaliciousStrela DownloaderBrowse
            • 13.107.246.45
            Voicemail_+Transcription+_ATT006151.docxGet hashmaliciousUnknownBrowse
            • 13.107.246.45
            https://www.mentimeter.com/app/presentation/alp52o7zih4ubnvbqe9pvb585a1z3bd7/edit?source=share-modalGet hashmaliciousUnknownBrowse
            • 13.107.246.45
            MWP0FO5rAF.exeGet hashmaliciousUnknownBrowse
            • 13.107.246.45
            3HnH4uJtE7.exeGet hashmaliciousFormBookBrowse
            • 13.107.246.45
            Encrypted_Archive_2025_LHC1W64SMW.htmlGet hashmaliciousHTMLPhisherBrowse
            • 13.107.246.45
            No context
            No context
            No context
            Process:C:\Users\user\Desktop\ZV2G9QQzlR.exe
            File Type:, SYS SQYMD\253\252LQ\212CEAMZLR\016W07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ\212CEACE\366\N\3439\372u\353T\025\200e
            Category:dropped
            Size (bytes):287744
            Entropy (8bit):7.9950599745544615
            Encrypted:true
            SSDEEP:6144:0IdTh3E1PTRnp4bkfdGZm1UT19z81G/JTfb7K6TVWYXnJL:RJmlP4bkM7f81kExYXnJL
            MD5:9BF9EC636360B1519FFF0948D4DC8867
            SHA1:99BBD852EB8C83065962CE014757FAE466278EE9
            SHA-256:AF2C5F0DB1D4D94A54AD727024DC62A870D203A4D00AD5234D2E7CC0C3ACBDB8
            SHA-512:19EF5B648B7D8559AB151A4B3F297B3EE5E9855C17A87E4FDABE3A5DBFBC16A05758AAD19186E69396A10FC62AEE1346C2D9D433CBF4987FE59031CED68CD0EA
            Malicious:false
            Reputation:low
            Preview:...W37TSQYMD..LQ.CEAMZLR.W07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ.CEACE.\N.9.u.T..e.=%".37.*(-?n4QY:<!y/!t'9?.*+a...r#8TRz^XSiDTULQ2C<@D.q2)..W3.h9*.N...#".W..r7W.N...q$3..8Q+x!*.LRNW07TS..MD.TMQ...MZLRNW07.SWXFE_UL.6CEAMZLRNW.#TSUIMDT%HQ2C.AMJLRNU07RSUYMDTUJQ2CEAMZL"JW05TSUYMDVU..2CUAMJLRNW 7TCUYMDTU\Q2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTUb%W;1AMZ..JW0'TSU.IDTELQ2CEAMZLRNW07tSU9MDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUY
            Process:C:\Users\user\Desktop\ZV2G9QQzlR.exe
            File Type:, SYS SQYMD\253\252LQ\212CEAMZLR\016W07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ\212CEACE\366\N\3439\372u\353T\025\200e
            Category:dropped
            Size (bytes):287744
            Entropy (8bit):7.9950599745544615
            Encrypted:true
            SSDEEP:6144:0IdTh3E1PTRnp4bkfdGZm1UT19z81G/JTfb7K6TVWYXnJL:RJmlP4bkM7f81kExYXnJL
            MD5:9BF9EC636360B1519FFF0948D4DC8867
            SHA1:99BBD852EB8C83065962CE014757FAE466278EE9
            SHA-256:AF2C5F0DB1D4D94A54AD727024DC62A870D203A4D00AD5234D2E7CC0C3ACBDB8
            SHA-512:19EF5B648B7D8559AB151A4B3F297B3EE5E9855C17A87E4FDABE3A5DBFBC16A05758AAD19186E69396A10FC62AEE1346C2D9D433CBF4987FE59031CED68CD0EA
            Malicious:false
            Reputation:low
            Preview:...W37TSQYMD..LQ.CEAMZLR.W07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ.CEACE.\N.9.u.T..e.=%".37.*(-?n4QY:<!y/!t'9?.*+a...r#8TRz^XSiDTULQ2C<@D.q2)..W3.h9*.N...#".W..r7W.N...q$3..8Q+x!*.LRNW07TS..MD.TMQ...MZLRNW07.SWXFE_UL.6CEAMZLRNW.#TSUIMDT%HQ2C.AMJLRNU07RSUYMDTUJQ2CEAMZL"JW05TSUYMDVU..2CUAMJLRNW 7TCUYMDTU\Q2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTUb%W;1AMZ..JW0'TSU.IDTELQ2CEAMZLRNW07tSU9MDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUYMDTULQ2CEAMZLRNW07TSUY
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):7.185350309576046
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:ZV2G9QQzlR.exe
            File size:1'203'712 bytes
            MD5:97285a8373f6dc1d7250e24a46972849
            SHA1:615cd2f15c22d33c15f19169dca5a4bbb5beb121
            SHA256:8034e571846e99f8e3a7edf472dea0bc0b903201ca63a572dd74a2a637345f7d
            SHA512:1ee90159693c1346ec37c6172603dea718e85f4b98448ffea593c9386fcf948a3c07fab73afb3d1c46d7386ab3ceeb7310f0aeb782de37b66d49945259f7539a
            SSDEEP:24576:zu6J33O0c+JY5UZ+XC0kGso6FasZggDpyBzGp57zVkkT7qsTWY:du0c++OCvkGs9FasZJDwB6pfkkP8Y
            TLSH:2045CF2273DDC361CB669133BF69B7016EBF7C614630B95B2F881D7DA850162262C7A3
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
            Icon Hash:aaf3e3e3938382a0
            Entrypoint:0x427dcd
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
            Time Stamp:0x675F7424 [Mon Dec 16 00:28:20 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:1
            File Version Major:5
            File Version Minor:1
            Subsystem Version Major:5
            Subsystem Version Minor:1
            Import Hash:afcdf79be1557326c854b6e20cb900a7
            Instruction
            call 00007F723891324Ah
            jmp 00007F7238906014h
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            push edi
            push esi
            mov esi, dword ptr [esp+10h]
            mov ecx, dword ptr [esp+14h]
            mov edi, dword ptr [esp+0Ch]
            mov eax, ecx
            mov edx, ecx
            add eax, esi
            cmp edi, esi
            jbe 00007F723890619Ah
            cmp edi, eax
            jc 00007F72389064FEh
            bt dword ptr [004C31FCh], 01h
            jnc 00007F7238906199h
            rep movsb
            jmp 00007F72389064ACh
            cmp ecx, 00000080h
            jc 00007F7238906364h
            mov eax, edi
            xor eax, esi
            test eax, 0000000Fh
            jne 00007F72389061A0h
            bt dword ptr [004BE324h], 01h
            jc 00007F7238906670h
            bt dword ptr [004C31FCh], 00000000h
            jnc 00007F723890633Dh
            test edi, 00000003h
            jne 00007F723890634Eh
            test esi, 00000003h
            jne 00007F723890632Dh
            bt edi, 02h
            jnc 00007F723890619Fh
            mov eax, dword ptr [esi]
            sub ecx, 04h
            lea esi, dword ptr [esi+04h]
            mov dword ptr [edi], eax
            lea edi, dword ptr [edi+04h]
            bt edi, 03h
            jnc 00007F72389061A3h
            movq xmm1, qword ptr [esi]
            sub ecx, 08h
            lea esi, dword ptr [esi+08h]
            movq qword ptr [edi], xmm1
            lea edi, dword ptr [edi+08h]
            test esi, 00000007h
            je 00007F72389061F5h
            bt esi, 03h
            jnc 00007F7238906248h
            Programming Language:
            • [ASM] VS2013 build 21005
            • [ C ] VS2013 build 21005
            • [C++] VS2013 build 21005
            • [ C ] VS2008 SP1 build 30729
            • [IMP] VS2008 SP1 build 30729
            • [ASM] VS2013 UPD4 build 31101
            • [RES] VS2013 build 21005
            • [LNK] VS2013 UPD4 build 31101
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x5d554.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1250000x711c.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0xc70000x5d5540x5d600bbbc869a0bde3267d7a6e04491e54dfeFalse0.9298313043842035data7.897749086727052IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x1250000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
            RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
            RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
            RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
            RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
            RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
            RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
            RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
            RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
            RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
            RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
            RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
            RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
            RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
            RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
            RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
            RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
            RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
            RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
            RT_RCDATA0xcf7b80x5481bdata1.0003351254842707
            RT_GROUP_ICON0x123fd40x76dataEnglishGreat Britain0.6610169491525424
            RT_GROUP_ICON0x12404c0x14dataEnglishGreat Britain1.25
            RT_GROUP_ICON0x1240600x14dataEnglishGreat Britain1.15
            RT_GROUP_ICON0x1240740x14dataEnglishGreat Britain1.25
            RT_VERSION0x1240880xdcdataEnglishGreat Britain0.6181818181818182
            RT_MANIFEST0x1241640x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
            DLLImport
            WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
            VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
            MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
            WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
            PSAPI.DLLGetProcessMemoryInfo
            IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
            USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
            UxTheme.dllIsThemeActive
            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
            USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
            GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
            COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
            SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
            OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
            Language of compilation systemCountry where language is spokenMap
            EnglishGreat Britain
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jan 10, 2025 20:03:37.442125082 CET1.1.1.1192.168.2.110x5dd2No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
            Jan 10, 2025 20:03:37.442125082 CET1.1.1.1192.168.2.110x5dd2No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:14:03:41
            Start date:10/01/2025
            Path:C:\Users\user\Desktop\ZV2G9QQzlR.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\ZV2G9QQzlR.exe"
            Imagebase:0xf50000
            File size:1'203'712 bytes
            MD5 hash:97285A8373F6DC1D7250E24A46972849
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:2
            Start time:14:03:42
            Start date:10/01/2025
            Path:C:\Windows\SysWOW64\svchost.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\ZV2G9QQzlR.exe"
            Imagebase:0x710000
            File size:46'504 bytes
            MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1552395026.0000000000310000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1552577849.0000000002760000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:3.1%
              Dynamic/Decrypted Code Coverage:0.4%
              Signature Coverage:7.3%
              Total number of Nodes:2000
              Total number of Limit Nodes:163
              execution_graph 104227 1206160 104241 1203db0 104227->104241 104229 1206212 104244 1206050 104229->104244 104243 120443b 104241->104243 104247 1207240 GetPEB 104241->104247 104243->104229 104245 1206059 Sleep 104244->104245 104246 1206067 104245->104246 104247->104243 104248 f51055 104253 f52649 104248->104253 104263 f57667 104253->104263 104258 f52754 104259 f5105a 104258->104259 104271 f53416 59 API calls 2 library calls 104258->104271 104260 f72d40 104259->104260 104317 f72c44 104260->104317 104262 f51064 104272 f70db6 104263->104272 104265 f57688 104266 f70db6 Mailbox 59 API calls 104265->104266 104267 f526b7 104266->104267 104268 f53582 104267->104268 104310 f535b0 104268->104310 104271->104258 104274 f70dbe 104272->104274 104275 f70dd8 104274->104275 104277 f70ddc std::exception::exception 104274->104277 104282 f7571c 104274->104282 104299 f733a1 DecodePointer 104274->104299 104275->104265 104300 f7859b RaiseException 104277->104300 104279 f70e06 104301 f784d1 58 API calls _free 104279->104301 104281 f70e18 104281->104265 104283 f75797 104282->104283 104296 f75728 104282->104296 104308 f733a1 DecodePointer 104283->104308 104285 f75733 104285->104296 104302 f7a16b 58 API calls 2 library calls 104285->104302 104303 f7a1c8 58 API calls 8 library calls 104285->104303 104304 f7309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104285->104304 104286 f7579d 104309 f78b28 58 API calls __getptd_noexit 104286->104309 104289 f7575b RtlAllocateHeap 104291 f7578f 104289->104291 104289->104296 104291->104274 104292 f75783 104306 f78b28 58 API calls __getptd_noexit 104292->104306 104296->104285 104296->104289 104296->104292 104297 f75781 104296->104297 104305 f733a1 DecodePointer 104296->104305 104307 f78b28 58 API calls __getptd_noexit 104297->104307 104299->104274 104300->104279 104301->104281 104302->104285 104303->104285 104305->104296 104306->104297 104307->104291 104308->104286 104309->104291 104311 f535bd 104310->104311 104312 f535a1 104310->104312 104311->104312 104313 f535c4 RegOpenKeyExW 104311->104313 104312->104258 104313->104312 104314 f535de RegQueryValueExW 104313->104314 104315 f53614 RegCloseKey 104314->104315 104316 f535ff 104314->104316 104315->104312 104316->104315 104318 f72c50 ___lock_fhandle 104317->104318 104325 f73217 104318->104325 104324 f72c77 ___lock_fhandle 104324->104262 104342 f79c0b 104325->104342 104327 f72c59 104328 f72c88 DecodePointer DecodePointer 104327->104328 104329 f72c65 104328->104329 104330 f72cb5 104328->104330 104339 f72c82 104329->104339 104330->104329 104388 f787a4 59 API calls 2 library calls 104330->104388 104332 f72d18 EncodePointer EncodePointer 104332->104329 104333 f72cc7 104333->104332 104334 f72cec 104333->104334 104389 f78864 61 API calls __realloc_crt 104333->104389 104334->104329 104337 f72d06 EncodePointer 104334->104337 104390 f78864 61 API calls __realloc_crt 104334->104390 104337->104332 104338 f72d00 104338->104329 104338->104337 104391 f73220 104339->104391 104343 f79c2f EnterCriticalSection 104342->104343 104344 f79c1c 104342->104344 104343->104327 104349 f79c93 104344->104349 104346 f79c22 104346->104343 104373 f730b5 58 API calls 3 library calls 104346->104373 104350 f79c9f ___lock_fhandle 104349->104350 104351 f79cc0 104350->104351 104352 f79ca8 104350->104352 104358 f79ce1 ___lock_fhandle 104351->104358 104377 f7881d 58 API calls 2 library calls 104351->104377 104374 f7a16b 58 API calls 2 library calls 104352->104374 104354 f79cad 104375 f7a1c8 58 API calls 8 library calls 104354->104375 104357 f79cd5 104360 f79cdc 104357->104360 104361 f79ceb 104357->104361 104358->104346 104359 f79cb4 104376 f7309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104359->104376 104378 f78b28 58 API calls __getptd_noexit 104360->104378 104363 f79c0b __lock 58 API calls 104361->104363 104365 f79cf2 104363->104365 104367 f79d17 104365->104367 104368 f79cff 104365->104368 104380 f72d55 104367->104380 104379 f79e2b InitializeCriticalSectionAndSpinCount 104368->104379 104371 f79d0b 104386 f79d33 LeaveCriticalSection _doexit 104371->104386 104374->104354 104375->104359 104377->104357 104378->104358 104379->104371 104381 f72d5e RtlFreeHeap 104380->104381 104382 f72d87 _free 104380->104382 104381->104382 104383 f72d73 104381->104383 104382->104371 104387 f78b28 58 API calls __getptd_noexit 104383->104387 104385 f72d79 GetLastError 104385->104382 104386->104358 104387->104385 104388->104333 104389->104334 104390->104338 104394 f79d75 LeaveCriticalSection 104391->104394 104393 f72c87 104393->104324 104394->104393 104395 f77c56 104396 f77c62 ___lock_fhandle 104395->104396 104432 f79e08 GetStartupInfoW 104396->104432 104398 f77c67 104434 f78b7c GetProcessHeap 104398->104434 104400 f77cbf 104401 f77cca 104400->104401 104517 f77da6 58 API calls 3 library calls 104400->104517 104435 f79ae6 104401->104435 104404 f77cd0 104405 f77cdb __RTC_Initialize 104404->104405 104518 f77da6 58 API calls 3 library calls 104404->104518 104456 f7d5d2 104405->104456 104408 f77cea 104409 f77cf6 GetCommandLineW 104408->104409 104519 f77da6 58 API calls 3 library calls 104408->104519 104475 f84f23 GetEnvironmentStringsW 104409->104475 104412 f77cf5 104412->104409 104415 f77d10 104416 f77d1b 104415->104416 104520 f730b5 58 API calls 3 library calls 104415->104520 104485 f84d58 104416->104485 104419 f77d21 104420 f77d2c 104419->104420 104521 f730b5 58 API calls 3 library calls 104419->104521 104499 f730ef 104420->104499 104423 f77d34 104424 f77d3f __wwincmdln 104423->104424 104522 f730b5 58 API calls 3 library calls 104423->104522 104505 f547d0 104424->104505 104427 f77d53 104428 f77d62 104427->104428 104523 f73358 58 API calls _doexit 104427->104523 104524 f730e0 58 API calls _doexit 104428->104524 104431 f77d67 ___lock_fhandle 104433 f79e1e 104432->104433 104433->104398 104434->104400 104525 f73187 36 API calls 2 library calls 104435->104525 104437 f79aeb 104526 f79d3c InitializeCriticalSectionAndSpinCount ___lock_fhandle 104437->104526 104439 f79af0 104440 f79af4 104439->104440 104528 f79d8a TlsAlloc 104439->104528 104527 f79b5c 61 API calls 2 library calls 104440->104527 104443 f79af9 104443->104404 104444 f79b06 104444->104440 104445 f79b11 104444->104445 104529 f787d5 104445->104529 104448 f79b53 104537 f79b5c 61 API calls 2 library calls 104448->104537 104451 f79b32 104451->104448 104453 f79b38 104451->104453 104452 f79b58 104452->104404 104536 f79a33 58 API calls 4 library calls 104453->104536 104455 f79b40 GetCurrentThreadId 104455->104404 104457 f7d5de ___lock_fhandle 104456->104457 104458 f79c0b __lock 58 API calls 104457->104458 104459 f7d5e5 104458->104459 104460 f787d5 __calloc_crt 58 API calls 104459->104460 104462 f7d5f6 104460->104462 104461 f7d661 GetStartupInfoW 104469 f7d676 104461->104469 104472 f7d7a5 104461->104472 104462->104461 104463 f7d601 ___lock_fhandle @_EH4_CallFilterFunc@8 104462->104463 104463->104408 104464 f7d86d 104551 f7d87d LeaveCriticalSection _doexit 104464->104551 104466 f787d5 __calloc_crt 58 API calls 104466->104469 104467 f7d7f2 GetStdHandle 104467->104472 104468 f7d805 GetFileType 104468->104472 104469->104466 104470 f7d6c4 104469->104470 104469->104472 104471 f7d6f8 GetFileType 104470->104471 104470->104472 104549 f79e2b InitializeCriticalSectionAndSpinCount 104470->104549 104471->104470 104472->104464 104472->104467 104472->104468 104550 f79e2b InitializeCriticalSectionAndSpinCount 104472->104550 104476 f77d06 104475->104476 104477 f84f34 104475->104477 104481 f84b1b GetModuleFileNameW 104476->104481 104552 f7881d 58 API calls 2 library calls 104477->104552 104479 f84f5a _memmove 104480 f84f70 FreeEnvironmentStringsW 104479->104480 104480->104476 104482 f84b4f _wparse_cmdline 104481->104482 104484 f84b8f _wparse_cmdline 104482->104484 104553 f7881d 58 API calls 2 library calls 104482->104553 104484->104415 104486 f84d71 __wsetenvp 104485->104486 104487 f84d69 104485->104487 104488 f787d5 __calloc_crt 58 API calls 104486->104488 104487->104419 104495 f84d9a __wsetenvp 104488->104495 104489 f84df1 104490 f72d55 _free 58 API calls 104489->104490 104490->104487 104491 f787d5 __calloc_crt 58 API calls 104491->104495 104492 f84e16 104494 f72d55 _free 58 API calls 104492->104494 104494->104487 104495->104487 104495->104489 104495->104491 104495->104492 104496 f84e2d 104495->104496 104554 f84607 58 API calls 2 library calls 104495->104554 104555 f78dc6 IsProcessorFeaturePresent 104496->104555 104498 f84e39 104498->104419 104500 f730fb __IsNonwritableInCurrentImage 104499->104500 104578 f7a4d1 104500->104578 104502 f73119 __initterm_e 104503 f72d40 __cinit 67 API calls 104502->104503 104504 f73138 _doexit __IsNonwritableInCurrentImage 104502->104504 104503->104504 104504->104423 104506 f547ea 104505->104506 104516 f54889 104505->104516 104507 f54824 IsThemeActive 104506->104507 104581 f7336c 104507->104581 104511 f54850 104593 f548fd SystemParametersInfoW SystemParametersInfoW 104511->104593 104513 f5485c 104594 f53b3a 104513->104594 104515 f54864 SystemParametersInfoW 104515->104516 104516->104427 104517->104401 104518->104405 104519->104412 104523->104428 104524->104431 104525->104437 104526->104439 104527->104443 104528->104444 104531 f787dc 104529->104531 104532 f78817 104531->104532 104534 f787fa 104531->104534 104538 f851f6 104531->104538 104532->104448 104535 f79de6 TlsSetValue 104532->104535 104534->104531 104534->104532 104546 f7a132 Sleep 104534->104546 104535->104451 104536->104455 104537->104452 104539 f8521c 104538->104539 104540 f85201 104538->104540 104542 f8522c HeapAlloc 104539->104542 104544 f85212 104539->104544 104548 f733a1 DecodePointer 104539->104548 104540->104539 104541 f8520d 104540->104541 104547 f78b28 58 API calls __getptd_noexit 104541->104547 104542->104539 104542->104544 104544->104531 104546->104534 104547->104544 104548->104539 104549->104470 104550->104472 104551->104463 104552->104479 104553->104484 104554->104495 104556 f78dd1 104555->104556 104561 f78c59 104556->104561 104560 f78dec 104560->104498 104562 f78c73 _memset __call_reportfault 104561->104562 104563 f78c93 IsDebuggerPresent 104562->104563 104569 f7a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 104563->104569 104566 f78d57 __call_reportfault 104570 f7c5f6 104566->104570 104567 f78d7a 104568 f7a140 GetCurrentProcess TerminateProcess 104567->104568 104568->104560 104569->104566 104571 f7c600 IsProcessorFeaturePresent 104570->104571 104572 f7c5fe 104570->104572 104574 f8590a 104571->104574 104572->104567 104577 f858b9 5 API calls 2 library calls 104574->104577 104576 f859ed 104576->104567 104577->104576 104579 f7a4d4 EncodePointer 104578->104579 104579->104579 104580 f7a4ee 104579->104580 104580->104502 104582 f79c0b __lock 58 API calls 104581->104582 104583 f73377 DecodePointer EncodePointer 104582->104583 104646 f79d75 LeaveCriticalSection 104583->104646 104585 f54849 104586 f733d4 104585->104586 104587 f733de 104586->104587 104588 f733f8 104586->104588 104587->104588 104647 f78b28 58 API calls __getptd_noexit 104587->104647 104588->104511 104590 f733e8 104648 f78db6 9 API calls __fclose_nolock 104590->104648 104592 f733f3 104592->104511 104593->104513 104595 f53b47 __ftell_nolock 104594->104595 104596 f57667 59 API calls 104595->104596 104597 f53b51 GetCurrentDirectoryW 104596->104597 104649 f53766 104597->104649 104599 f53b7a IsDebuggerPresent 104600 f8d272 MessageBoxA 104599->104600 104601 f53b88 104599->104601 104602 f8d28c 104600->104602 104601->104602 104603 f53ba5 104601->104603 104633 f53c61 104601->104633 104868 f57213 59 API calls Mailbox 104602->104868 104730 f57285 104603->104730 104604 f53c68 SetCurrentDirectoryW 104607 f53c75 Mailbox 104604->104607 104607->104515 104608 f8d29c 104613 f8d2b2 SetCurrentDirectoryW 104608->104613 104610 f53bc3 GetFullPathNameW 104746 f57bcc 104610->104746 104612 f53bfe 104755 f6092d 104612->104755 104613->104607 104616 f53c1c 104617 f53c26 104616->104617 104869 fa874b AllocateAndInitializeSid CheckTokenMembership FreeSid 104616->104869 104771 f53a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 104617->104771 104620 f8d2cf 104620->104617 104624 f8d2e0 104620->104624 104623 f53c30 104625 f53c43 104623->104625 104779 f5434a 104623->104779 104870 f54706 104624->104870 104790 f609d0 104625->104790 104629 f8d2e8 104877 f57de1 104629->104877 104631 f53c4e 104631->104633 104867 f5443a Shell_NotifyIconW _memset 104631->104867 104632 f8d2f5 104634 f8d2ff 104632->104634 104635 f8d324 104632->104635 104633->104604 104881 f57cab 104634->104881 104638 f57cab 59 API calls 104635->104638 104640 f8d320 GetForegroundWindow ShellExecuteW 104638->104640 104644 f8d354 Mailbox 104640->104644 104644->104633 104645 f57cab 59 API calls 104645->104640 104646->104585 104647->104590 104648->104592 104650 f57667 59 API calls 104649->104650 104651 f5377c 104650->104651 104897 f53d31 104651->104897 104653 f5379a 104654 f54706 61 API calls 104653->104654 104655 f537ae 104654->104655 104656 f57de1 59 API calls 104655->104656 104657 f537bb 104656->104657 104911 f54ddd 104657->104911 104660 f537dc Mailbox 104935 f58047 104660->104935 104661 f8d173 104982 fb955b 104661->104982 104664 f8d192 104667 f72d55 _free 58 API calls 104664->104667 104670 f8d19f 104667->104670 104671 f54e4a 84 API calls 104670->104671 104673 f8d1a8 104671->104673 104677 f53ed0 59 API calls 104673->104677 104674 f57de1 59 API calls 104675 f53808 104674->104675 104942 f584c0 104675->104942 104679 f8d1c3 104677->104679 104678 f5381a Mailbox 104680 f57de1 59 API calls 104678->104680 104681 f53ed0 59 API calls 104679->104681 104682 f53840 104680->104682 104683 f8d1df 104681->104683 104684 f584c0 69 API calls 104682->104684 104685 f54706 61 API calls 104683->104685 104687 f5384f Mailbox 104684->104687 104686 f8d204 104685->104686 104688 f53ed0 59 API calls 104686->104688 104689 f57667 59 API calls 104687->104689 104690 f8d210 104688->104690 104692 f5386d 104689->104692 104691 f58047 59 API calls 104690->104691 104693 f8d21e 104691->104693 104946 f53ed0 104692->104946 104695 f53ed0 59 API calls 104693->104695 104697 f8d22d 104695->104697 104703 f58047 59 API calls 104697->104703 104699 f53887 104699->104673 104700 f53891 104699->104700 104701 f72efd _W_store_winword 60 API calls 104700->104701 104702 f5389c 104701->104702 104702->104679 104704 f538a6 104702->104704 104705 f8d24f 104703->104705 104706 f72efd _W_store_winword 60 API calls 104704->104706 104707 f53ed0 59 API calls 104705->104707 104708 f538b1 104706->104708 104709 f8d25c 104707->104709 104708->104683 104710 f538bb 104708->104710 104709->104709 104711 f72efd _W_store_winword 60 API calls 104710->104711 104712 f538c6 104711->104712 104712->104697 104713 f53907 104712->104713 104715 f53ed0 59 API calls 104712->104715 104713->104697 104714 f53914 104713->104714 104962 f592ce 104714->104962 104716 f538ea 104715->104716 104718 f58047 59 API calls 104716->104718 104720 f538f8 104718->104720 104722 f53ed0 59 API calls 104720->104722 104722->104713 104725 f5928a 59 API calls 104727 f5394f 104725->104727 104726 f58ee0 60 API calls 104726->104727 104727->104725 104727->104726 104728 f53ed0 59 API calls 104727->104728 104729 f53995 Mailbox 104727->104729 104728->104727 104729->104599 104731 f57292 __ftell_nolock 104730->104731 104732 f572ab 104731->104732 104733 f8ea22 _memset 104731->104733 105615 f54750 104732->105615 104735 f8ea3e GetOpenFileNameW 104733->104735 104737 f8ea8d 104735->104737 104739 f57bcc 59 API calls 104737->104739 104742 f8eaa2 104739->104742 104742->104742 104743 f572c9 105643 f5686a 104743->105643 104747 f57c45 104746->104747 104748 f57bd8 __wsetenvp 104746->104748 104749 f57d2c 59 API calls 104747->104749 104750 f57c13 104748->104750 104751 f57bee 104748->104751 104754 f57bf6 _memmove 104749->104754 104752 f58029 59 API calls 104750->104752 105902 f57f27 59 API calls Mailbox 104751->105902 104752->104754 104754->104612 104756 f6093a __ftell_nolock 104755->104756 105903 f56d80 104756->105903 104758 f6093f 104770 f53c14 104758->104770 105914 f6119e 89 API calls 104758->105914 104760 f6094c 104760->104770 105915 f63ee7 91 API calls Mailbox 104760->105915 104762 f60955 104763 f60959 GetFullPathNameW 104762->104763 104762->104770 104764 f57bcc 59 API calls 104763->104764 104765 f60985 104764->104765 104766 f57bcc 59 API calls 104765->104766 104768 f60992 104766->104768 104767 f94cab _wcscat 104768->104767 104769 f57bcc 59 API calls 104768->104769 104769->104770 104770->104608 104770->104616 104772 f53ab0 LoadImageW RegisterClassExW 104771->104772 104773 f8d261 104771->104773 105957 f53041 7 API calls 104772->105957 105958 f547a0 LoadImageW EnumResourceNamesW 104773->105958 104776 f53b34 104778 f539d5 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 104776->104778 104777 f8d26a 104778->104623 104780 f54375 _memset 104779->104780 105959 f54182 104780->105959 104783 f543fa 104785 f54414 Shell_NotifyIconW 104783->104785 104786 f54430 Shell_NotifyIconW 104783->104786 104787 f54422 104785->104787 104786->104787 105963 f5407c 104787->105963 104789 f54429 104789->104625 104791 f94cc3 104790->104791 104802 f609f5 104790->104802 106042 fb9e4a 89 API calls 4 library calls 104791->106042 104793 f60cfa 104793->104631 104795 f60ee4 104795->104793 104797 f60ef1 104795->104797 106040 f61093 341 API calls Mailbox 104797->106040 104798 f60a4b PeekMessageW 104865 f60a05 Mailbox 104798->104865 104800 f60ef8 LockWindowUpdate DestroyWindow GetMessageW 104800->104793 104804 f60f2a 104800->104804 104802->104865 106043 f59e5d 60 API calls 104802->106043 106044 fa6349 341 API calls 104802->106044 104803 f94e81 Sleep 104803->104865 104806 f95c58 TranslateMessage DispatchMessageW GetMessageW 104804->104806 104806->104806 104808 f95c88 104806->104808 104807 f60ce4 104807->104793 106039 f61070 10 API calls Mailbox 104807->106039 104808->104793 104809 f60ea5 TranslateMessage DispatchMessageW 104810 f60e43 PeekMessageW 104809->104810 104810->104865 104811 f94d50 TranslateAcceleratorW 104811->104810 104811->104865 104812 f59e5d 60 API calls 104812->104865 104813 f60d13 timeGetTime 104813->104865 104814 f9581f WaitForSingleObject 104818 f9583c GetExitCodeProcess CloseHandle 104814->104818 104814->104865 104816 f70db6 59 API calls Mailbox 104816->104865 104817 f57667 59 API calls 104851 f60e70 Mailbox 104817->104851 104849 f60f95 104818->104849 104819 f60e5f Sleep 104819->104851 104820 f58047 59 API calls 104820->104865 104821 f95af8 Sleep 104821->104851 104823 f7049f timeGetTime 104823->104851 104825 f60f4e timeGetTime 106041 f59e5d 60 API calls 104825->106041 104828 f95b8f GetExitCodeProcess 104832 f95bbb CloseHandle 104828->104832 104833 f95ba5 WaitForSingleObject 104828->104833 104830 fd5f25 110 API calls 104830->104851 104831 f5b7dd 109 API calls 104831->104851 104832->104851 104833->104832 104833->104865 104836 f95874 104836->104849 104837 f95078 Sleep 104837->104865 104838 f95c17 Sleep 104838->104865 104841 f57de1 59 API calls 104841->104851 104844 f59ea0 314 API calls 104844->104865 104849->104631 104851->104817 104851->104823 104851->104828 104851->104830 104851->104831 104851->104836 104851->104837 104851->104838 104851->104841 104851->104849 104851->104865 106069 fb2408 60 API calls 104851->106069 106070 f59e5d 60 API calls 104851->106070 106071 f589b3 69 API calls Mailbox 104851->106071 106072 f5b73c 341 API calls 104851->106072 106073 fa64da 60 API calls 104851->106073 106074 fb5244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 104851->106074 106075 fb3c55 66 API calls Mailbox 104851->106075 104852 f584c0 69 API calls 104852->104865 104854 fb9e4a 89 API calls 104854->104865 104855 f59c90 59 API calls Mailbox 104855->104865 104857 fa617e 59 API calls Mailbox 104857->104865 104858 f57de1 59 API calls 104858->104865 104859 f589b3 69 API calls 104859->104865 104860 f955d5 VariantClear 104860->104865 104861 f9566b VariantClear 104861->104865 104862 f95419 VariantClear 104862->104865 104863 f58cd4 59 API calls Mailbox 104863->104865 104864 fa6e8f 59 API calls 104864->104865 104865->104798 104865->104803 104865->104807 104865->104809 104865->104810 104865->104811 104865->104812 104865->104813 104865->104814 104865->104816 104865->104819 104865->104820 104865->104821 104865->104825 104865->104844 104865->104849 104865->104851 104865->104852 104865->104854 104865->104855 104865->104857 104865->104858 104865->104859 104865->104860 104865->104861 104865->104862 104865->104863 104865->104864 104866 f5b73c 314 API calls 104865->104866 105986 f5e6a0 104865->105986 106017 f5f460 104865->106017 106036 f5e420 341 API calls 104865->106036 106037 f5fce0 341 API calls 2 library calls 104865->106037 106038 f531ce IsDialogMessageW GetClassLongW 104865->106038 106045 fd6018 59 API calls 104865->106045 106046 fb9a15 59 API calls Mailbox 104865->106046 106047 fad4f2 59 API calls 104865->106047 106048 f59837 104865->106048 106066 fa60ef 59 API calls 2 library calls 104865->106066 106067 f58401 59 API calls 104865->106067 106068 f582df 59 API calls Mailbox 104865->106068 104866->104865 104867->104633 104868->104608 104869->104620 104871 f81940 __ftell_nolock 104870->104871 104872 f54713 GetModuleFileNameW 104871->104872 104873 f57de1 59 API calls 104872->104873 104874 f54739 104873->104874 104875 f54750 60 API calls 104874->104875 104876 f54743 Mailbox 104875->104876 104876->104629 104878 f57df0 __wsetenvp _memmove 104877->104878 104879 f70db6 Mailbox 59 API calls 104878->104879 104880 f57e2e 104879->104880 104880->104632 104882 f8ed4a 104881->104882 104883 f57cbf 104881->104883 104884 f58029 59 API calls 104882->104884 106463 f57c50 104883->106463 104886 f8ed55 __wsetenvp _memmove 104884->104886 104887 f57cca 104888 f57b2e 104887->104888 104889 f8ec6b 104888->104889 104890 f57b40 104888->104890 106474 fa7bdb 59 API calls _memmove 104889->106474 106468 f57a51 104890->106468 104893 f57b4c 104893->104645 104894 f8ec75 104895 f58047 59 API calls 104894->104895 104896 f8ec7d Mailbox 104895->104896 104898 f53d3e __ftell_nolock 104897->104898 104899 f57bcc 59 API calls 104898->104899 104904 f53ea4 Mailbox 104898->104904 104901 f53d70 104899->104901 104909 f53da6 Mailbox 104901->104909 105023 f579f2 104901->105023 104902 f579f2 59 API calls 104902->104909 104903 f53e77 104903->104904 104905 f57de1 59 API calls 104903->104905 104904->104653 104907 f53e98 104905->104907 104906 f57de1 59 API calls 104906->104909 104908 f53f74 59 API calls 104907->104908 104908->104904 104909->104902 104909->104903 104909->104904 104909->104906 105026 f53f74 104909->105026 105036 f54bb5 104911->105036 104916 f54e08 LoadLibraryExW 105046 f54b6a 104916->105046 104917 f8d8e6 104918 f54e4a 84 API calls 104917->104918 104920 f8d8ed 104918->104920 104922 f54b6a 3 API calls 104920->104922 104924 f8d8f5 104922->104924 105072 f54f0b 104924->105072 104925 f54e2f 104925->104924 104926 f54e3b 104925->104926 104928 f54e4a 84 API calls 104926->104928 104929 f537d4 104928->104929 104929->104660 104929->104661 104932 f8d91c 105080 f54ec7 104932->105080 104934 f8d929 104936 f58052 104935->104936 104937 f537ef 104935->104937 105334 f57f77 59 API calls 2 library calls 104936->105334 104939 f5928a 104937->104939 104940 f70db6 Mailbox 59 API calls 104939->104940 104941 f537fb 104940->104941 104941->104674 104943 f584cb 104942->104943 104944 f584f2 104943->104944 105335 f589b3 69 API calls Mailbox 104943->105335 104944->104678 104947 f53ef3 104946->104947 104948 f53eda 104946->104948 104949 f57bcc 59 API calls 104947->104949 104950 f58047 59 API calls 104948->104950 104951 f53879 104949->104951 104950->104951 104952 f72efd 104951->104952 104953 f72f7e 104952->104953 104954 f72f09 104952->104954 105338 f72f90 60 API calls 4 library calls 104953->105338 104961 f72f2e 104954->104961 105336 f78b28 58 API calls __getptd_noexit 104954->105336 104957 f72f8b 104957->104699 104958 f72f15 105337 f78db6 9 API calls __fclose_nolock 104958->105337 104960 f72f20 104960->104699 104961->104699 104963 f592d6 104962->104963 104964 f70db6 Mailbox 59 API calls 104963->104964 104965 f592e4 104964->104965 104966 f53924 104965->104966 105339 f591fc 59 API calls Mailbox 104965->105339 104968 f59050 104966->104968 105340 f59160 104968->105340 104970 f5905f 104971 f70db6 Mailbox 59 API calls 104970->104971 104972 f53932 104970->104972 104971->104972 104973 f58ee0 104972->104973 104974 f8f17c 104973->104974 104980 f58ef7 104973->104980 104974->104980 105350 f58bdb 59 API calls Mailbox 104974->105350 104976 f59040 105349 f59d3c 60 API calls Mailbox 104976->105349 104977 f58ff8 104978 f70db6 Mailbox 59 API calls 104977->104978 104981 f58fff 104978->104981 104980->104976 104980->104977 104980->104981 104981->104727 104983 f54ee5 85 API calls 104982->104983 104984 fb95ca 104983->104984 105351 fb9734 104984->105351 104987 f54f0b 74 API calls 104988 fb95f7 104987->104988 104989 f54f0b 74 API calls 104988->104989 104990 fb9607 104989->104990 104991 f54f0b 74 API calls 104990->104991 104992 fb9622 104991->104992 104993 f54f0b 74 API calls 104992->104993 104994 fb963d 104993->104994 104995 f54ee5 85 API calls 104994->104995 104996 fb9654 104995->104996 104997 f7571c __crtGetStringTypeA_stat 58 API calls 104996->104997 104998 fb965b 104997->104998 104999 f7571c __crtGetStringTypeA_stat 58 API calls 104998->104999 105000 fb9665 104999->105000 105001 f54f0b 74 API calls 105000->105001 105002 fb9679 105001->105002 105003 fb9109 GetSystemTimeAsFileTime 105002->105003 105004 fb968c 105003->105004 105005 fb96a1 105004->105005 105006 fb96b6 105004->105006 105007 f72d55 _free 58 API calls 105005->105007 105008 fb971b 105006->105008 105009 fb96bc 105006->105009 105011 fb96a7 105007->105011 105010 f72d55 _free 58 API calls 105008->105010 105357 fb8b06 116 API calls __fcloseall 105009->105357 105016 f8d186 105010->105016 105014 f72d55 _free 58 API calls 105011->105014 105013 fb9713 105015 f72d55 _free 58 API calls 105013->105015 105014->105016 105015->105016 105016->104664 105017 f54e4a 105016->105017 105018 f54e54 105017->105018 105022 f54e5b 105017->105022 105358 f753a6 105018->105358 105020 f54e7b FreeLibrary 105021 f54e6a 105020->105021 105021->104664 105022->105020 105022->105021 105032 f57e4f 105023->105032 105025 f579fd 105025->104901 105027 f53f82 105026->105027 105031 f53fa4 _memmove 105026->105031 105030 f70db6 Mailbox 59 API calls 105027->105030 105028 f70db6 Mailbox 59 API calls 105029 f53fb8 105028->105029 105029->104909 105030->105031 105031->105028 105033 f57e62 105032->105033 105035 f57e5f _memmove 105032->105035 105034 f70db6 Mailbox 59 API calls 105033->105034 105034->105035 105035->105025 105085 f54c03 105036->105085 105039 f54c03 2 API calls 105042 f54bdc 105039->105042 105040 f54bf5 105043 f7525b 105040->105043 105041 f54bec FreeLibrary 105041->105040 105042->105040 105042->105041 105089 f75270 105043->105089 105045 f54dfc 105045->104916 105045->104917 105249 f54c36 105046->105249 105049 f54b8f 105051 f54ba1 FreeLibrary 105049->105051 105052 f54baa 105049->105052 105050 f54c36 2 API calls 105050->105049 105051->105052 105053 f54c70 105052->105053 105054 f70db6 Mailbox 59 API calls 105053->105054 105055 f54c85 105054->105055 105253 f5522e 105055->105253 105057 f54c91 _memmove 105058 f54ccc 105057->105058 105060 f54dc1 105057->105060 105061 f54d89 105057->105061 105059 f54ec7 69 API calls 105058->105059 105068 f54cd5 105059->105068 105267 fb991b 95 API calls 105060->105267 105256 f54e89 CreateStreamOnHGlobal 105061->105256 105064 f54f0b 74 API calls 105064->105068 105066 f54d69 105066->104925 105067 f8d8a7 105069 f54ee5 85 API calls 105067->105069 105068->105064 105068->105066 105068->105067 105262 f54ee5 105068->105262 105070 f8d8bb 105069->105070 105071 f54f0b 74 API calls 105070->105071 105071->105066 105073 f8d9cd 105072->105073 105074 f54f1d 105072->105074 105291 f755e2 105074->105291 105077 fb9109 105311 fb8f5f 105077->105311 105079 fb911f 105079->104932 105081 f54ed6 105080->105081 105082 f8d990 105080->105082 105316 f75c60 105081->105316 105084 f54ede 105084->104934 105086 f54bd0 105085->105086 105087 f54c0c LoadLibraryA 105085->105087 105086->105039 105086->105042 105087->105086 105088 f54c1d GetProcAddress 105087->105088 105088->105086 105092 f7527c ___lock_fhandle 105089->105092 105090 f7528f 105138 f78b28 58 API calls __getptd_noexit 105090->105138 105092->105090 105094 f752c0 105092->105094 105093 f75294 105139 f78db6 9 API calls __fclose_nolock 105093->105139 105108 f804e8 105094->105108 105097 f752c5 105098 f752ce 105097->105098 105099 f752db 105097->105099 105140 f78b28 58 API calls __getptd_noexit 105098->105140 105101 f75305 105099->105101 105102 f752e5 105099->105102 105123 f80607 105101->105123 105141 f78b28 58 API calls __getptd_noexit 105102->105141 105104 f7529f ___lock_fhandle @_EH4_CallFilterFunc@8 105104->105045 105109 f804f4 ___lock_fhandle 105108->105109 105110 f79c0b __lock 58 API calls 105109->105110 105120 f80502 105110->105120 105111 f80576 105143 f805fe 105111->105143 105112 f8057d 105148 f7881d 58 API calls 2 library calls 105112->105148 105115 f805f3 ___lock_fhandle 105115->105097 105116 f80584 105116->105111 105149 f79e2b InitializeCriticalSectionAndSpinCount 105116->105149 105118 f79c93 __mtinitlocknum 58 API calls 105118->105120 105120->105111 105120->105112 105120->105118 105146 f76c50 59 API calls __lock 105120->105146 105147 f76cba LeaveCriticalSection LeaveCriticalSection _doexit 105120->105147 105121 f805aa EnterCriticalSection 105121->105111 105124 f80627 __wopenfile 105123->105124 105125 f80641 105124->105125 105137 f807fc 105124->105137 105156 f737cb 60 API calls 3 library calls 105124->105156 105154 f78b28 58 API calls __getptd_noexit 105125->105154 105127 f80646 105155 f78db6 9 API calls __fclose_nolock 105127->105155 105129 f8085f 105151 f885a1 105129->105151 105131 f75310 105142 f75332 LeaveCriticalSection LeaveCriticalSection _fprintf 105131->105142 105133 f807f5 105133->105137 105157 f737cb 60 API calls 3 library calls 105133->105157 105135 f80814 105135->105137 105158 f737cb 60 API calls 3 library calls 105135->105158 105137->105125 105137->105129 105138->105093 105139->105104 105140->105104 105141->105104 105142->105104 105150 f79d75 LeaveCriticalSection 105143->105150 105145 f80605 105145->105115 105146->105120 105147->105120 105148->105116 105149->105121 105150->105145 105159 f87d85 105151->105159 105153 f885ba 105153->105131 105154->105127 105155->105131 105156->105133 105157->105135 105158->105137 105160 f87d91 ___lock_fhandle 105159->105160 105161 f87da7 105160->105161 105164 f87ddd 105160->105164 105246 f78b28 58 API calls __getptd_noexit 105161->105246 105163 f87dac 105247 f78db6 9 API calls __fclose_nolock 105163->105247 105170 f87e4e 105164->105170 105167 f87df9 105248 f87e22 LeaveCriticalSection __unlock_fhandle 105167->105248 105169 f87db6 ___lock_fhandle 105169->105153 105171 f87e6e 105170->105171 105172 f744ea __wsopen_nolock 58 API calls 105171->105172 105175 f87e8a 105172->105175 105173 f78dc6 __invoke_watson 8 API calls 105174 f885a0 105173->105174 105176 f87d85 __wsopen_helper 103 API calls 105174->105176 105177 f87ec4 105175->105177 105183 f87ee7 105175->105183 105193 f87fc1 105175->105193 105178 f885ba 105176->105178 105179 f78af4 __chsize_nolock 58 API calls 105177->105179 105178->105167 105180 f87ec9 105179->105180 105181 f78b28 __calloc_impl 58 API calls 105180->105181 105182 f87ed6 105181->105182 105184 f78db6 __fclose_nolock 9 API calls 105182->105184 105185 f87fa5 105183->105185 105192 f87f83 105183->105192 105186 f87ee0 105184->105186 105187 f78af4 __chsize_nolock 58 API calls 105185->105187 105186->105167 105188 f87faa 105187->105188 105189 f78b28 __calloc_impl 58 API calls 105188->105189 105190 f87fb7 105189->105190 105191 f78db6 __fclose_nolock 9 API calls 105190->105191 105191->105193 105194 f7d294 __alloc_osfhnd 61 API calls 105192->105194 105193->105173 105195 f88051 105194->105195 105196 f8805b 105195->105196 105197 f8807e 105195->105197 105199 f78af4 __chsize_nolock 58 API calls 105196->105199 105198 f87cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 105197->105198 105209 f880a0 105198->105209 105200 f88060 105199->105200 105202 f78b28 __calloc_impl 58 API calls 105200->105202 105201 f8811e GetFileType 105203 f88129 GetLastError 105201->105203 105204 f8816b 105201->105204 105206 f8806a 105202->105206 105208 f78b07 __dosmaperr 58 API calls 105203->105208 105216 f7d52a __set_osfhnd 59 API calls 105204->105216 105205 f880ec GetLastError 105210 f78b07 __dosmaperr 58 API calls 105205->105210 105207 f78b28 __calloc_impl 58 API calls 105206->105207 105207->105186 105211 f88150 CloseHandle 105208->105211 105209->105201 105209->105205 105212 f87cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 105209->105212 105213 f88111 105210->105213 105211->105213 105214 f8815e 105211->105214 105215 f880e1 105212->105215 105218 f78b28 __calloc_impl 58 API calls 105213->105218 105217 f78b28 __calloc_impl 58 API calls 105214->105217 105215->105201 105215->105205 105221 f88189 105216->105221 105219 f88163 105217->105219 105218->105193 105219->105213 105220 f88344 105220->105193 105223 f88517 CloseHandle 105220->105223 105221->105220 105222 f818c1 __lseeki64_nolock 60 API calls 105221->105222 105239 f8820a 105221->105239 105224 f881f3 105222->105224 105225 f87cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 105223->105225 105227 f78af4 __chsize_nolock 58 API calls 105224->105227 105244 f88212 105224->105244 105226 f8853e 105225->105226 105229 f883ce 105226->105229 105230 f88546 GetLastError 105226->105230 105227->105239 105228 f80e5b 70 API calls __read_nolock 105228->105244 105229->105193 105231 f78b07 __dosmaperr 58 API calls 105230->105231 105233 f88552 105231->105233 105232 f818c1 60 API calls __lseeki64_nolock 105232->105244 105236 f7d43d __free_osfhnd 59 API calls 105233->105236 105234 f80add __close_nolock 61 API calls 105234->105244 105235 f897a2 __chsize_nolock 82 API calls 105235->105244 105236->105229 105237 f7d886 __write 78 API calls 105237->105239 105238 f818c1 60 API calls __lseeki64_nolock 105238->105239 105239->105220 105239->105237 105239->105238 105239->105244 105240 f883c1 105241 f80add __close_nolock 61 API calls 105240->105241 105243 f883c8 105241->105243 105242 f883aa 105242->105220 105245 f78b28 __calloc_impl 58 API calls 105243->105245 105244->105228 105244->105232 105244->105234 105244->105235 105244->105239 105244->105240 105244->105242 105245->105229 105246->105163 105247->105169 105248->105169 105250 f54b83 105249->105250 105251 f54c3f LoadLibraryA 105249->105251 105250->105049 105250->105050 105251->105250 105252 f54c50 GetProcAddress 105251->105252 105252->105250 105254 f70db6 Mailbox 59 API calls 105253->105254 105255 f55240 105254->105255 105255->105057 105257 f54ec0 105256->105257 105258 f54ea3 FindResourceExW 105256->105258 105257->105058 105258->105257 105259 f8d933 LoadResource 105258->105259 105259->105257 105260 f8d948 SizeofResource 105259->105260 105260->105257 105261 f8d95c LockResource 105260->105261 105261->105257 105263 f54ef4 105262->105263 105264 f8d9ab 105262->105264 105268 f7584d 105263->105268 105266 f54f02 105266->105068 105267->105058 105271 f75859 ___lock_fhandle 105268->105271 105269 f7586b 105281 f78b28 58 API calls __getptd_noexit 105269->105281 105271->105269 105272 f75891 105271->105272 105283 f76c11 105272->105283 105274 f75870 105282 f78db6 9 API calls __fclose_nolock 105274->105282 105275 f75897 105289 f757be 83 API calls 5 library calls 105275->105289 105278 f758a6 105290 f758c8 LeaveCriticalSection LeaveCriticalSection _fprintf 105278->105290 105280 f7587b ___lock_fhandle 105280->105266 105281->105274 105282->105280 105284 f76c43 EnterCriticalSection 105283->105284 105285 f76c21 105283->105285 105287 f76c39 105284->105287 105285->105284 105286 f76c29 105285->105286 105288 f79c0b __lock 58 API calls 105286->105288 105287->105275 105288->105287 105289->105278 105290->105280 105294 f755fd 105291->105294 105293 f54f2e 105293->105077 105295 f75609 ___lock_fhandle 105294->105295 105296 f7561f _memset 105295->105296 105297 f7564c 105295->105297 105298 f75644 ___lock_fhandle 105295->105298 105307 f78b28 58 API calls __getptd_noexit 105296->105307 105299 f76c11 __lock_file 59 API calls 105297->105299 105298->105293 105301 f75652 105299->105301 105309 f7541d 72 API calls 6 library calls 105301->105309 105302 f75639 105308 f78db6 9 API calls __fclose_nolock 105302->105308 105305 f75668 105310 f75686 LeaveCriticalSection LeaveCriticalSection _fprintf 105305->105310 105307->105302 105308->105298 105309->105305 105310->105298 105314 f7520a GetSystemTimeAsFileTime 105311->105314 105313 fb8f6e 105313->105079 105315 f75238 __aulldiv 105314->105315 105315->105313 105317 f75c6c ___lock_fhandle 105316->105317 105318 f75c93 105317->105318 105319 f75c7e 105317->105319 105320 f76c11 __lock_file 59 API calls 105318->105320 105330 f78b28 58 API calls __getptd_noexit 105319->105330 105322 f75c99 105320->105322 105332 f758d0 67 API calls 6 library calls 105322->105332 105323 f75c83 105331 f78db6 9 API calls __fclose_nolock 105323->105331 105326 f75ca4 105333 f75cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 105326->105333 105328 f75cb6 105329 f75c8e ___lock_fhandle 105328->105329 105329->105084 105330->105323 105331->105329 105332->105326 105333->105328 105334->104937 105335->104944 105336->104958 105337->104960 105338->104957 105339->104966 105341 f59169 Mailbox 105340->105341 105342 f8f19f 105341->105342 105347 f59173 105341->105347 105343 f70db6 Mailbox 59 API calls 105342->105343 105345 f8f1ab 105343->105345 105344 f5917a 105344->104970 105347->105344 105348 f59c90 59 API calls Mailbox 105347->105348 105348->105347 105349->104981 105350->104980 105353 fb9748 __tzset_nolock _wcscmp 105351->105353 105352 fb9109 GetSystemTimeAsFileTime 105352->105353 105353->105352 105354 f54f0b 74 API calls 105353->105354 105355 fb95dc 105353->105355 105356 f54ee5 85 API calls 105353->105356 105354->105353 105355->104987 105355->105016 105356->105353 105357->105013 105359 f753b2 ___lock_fhandle 105358->105359 105360 f753c6 105359->105360 105361 f753de 105359->105361 105387 f78b28 58 API calls __getptd_noexit 105360->105387 105364 f76c11 __lock_file 59 API calls 105361->105364 105366 f753d6 ___lock_fhandle 105361->105366 105363 f753cb 105388 f78db6 9 API calls __fclose_nolock 105363->105388 105367 f753f0 105364->105367 105366->105022 105371 f7533a 105367->105371 105372 f7535d 105371->105372 105373 f75349 105371->105373 105374 f75359 105372->105374 105390 f74a3d 105372->105390 105433 f78b28 58 API calls __getptd_noexit 105373->105433 105389 f75415 LeaveCriticalSection LeaveCriticalSection _fprintf 105374->105389 105376 f7534e 105434 f78db6 9 API calls __fclose_nolock 105376->105434 105383 f75377 105407 f80a02 105383->105407 105385 f7537d 105385->105374 105386 f72d55 _free 58 API calls 105385->105386 105386->105374 105387->105363 105388->105366 105389->105366 105391 f74a50 105390->105391 105395 f74a74 105390->105395 105392 f746e6 __fclose_nolock 58 API calls 105391->105392 105391->105395 105393 f74a6d 105392->105393 105435 f7d886 105393->105435 105396 f80b77 105395->105396 105397 f75371 105396->105397 105398 f80b84 105396->105398 105400 f746e6 105397->105400 105398->105397 105399 f72d55 _free 58 API calls 105398->105399 105399->105397 105401 f74705 105400->105401 105402 f746f0 105400->105402 105401->105383 105570 f78b28 58 API calls __getptd_noexit 105402->105570 105404 f746f5 105571 f78db6 9 API calls __fclose_nolock 105404->105571 105406 f74700 105406->105383 105408 f80a0e ___lock_fhandle 105407->105408 105409 f80a1b 105408->105409 105410 f80a32 105408->105410 105587 f78af4 58 API calls __getptd_noexit 105409->105587 105412 f80abd 105410->105412 105414 f80a42 105410->105414 105592 f78af4 58 API calls __getptd_noexit 105412->105592 105413 f80a20 105588 f78b28 58 API calls __getptd_noexit 105413->105588 105417 f80a6a 105414->105417 105418 f80a60 105414->105418 105421 f7d206 ___lock_fhandle 59 API calls 105417->105421 105589 f78af4 58 API calls __getptd_noexit 105418->105589 105419 f80a65 105593 f78b28 58 API calls __getptd_noexit 105419->105593 105423 f80a70 105421->105423 105424 f80a8e 105423->105424 105425 f80a83 105423->105425 105590 f78b28 58 API calls __getptd_noexit 105424->105590 105572 f80add 105425->105572 105426 f80ac9 105594 f78db6 9 API calls __fclose_nolock 105426->105594 105428 f80a27 ___lock_fhandle 105428->105385 105431 f80a89 105591 f80ab5 LeaveCriticalSection __unlock_fhandle 105431->105591 105433->105376 105434->105374 105436 f7d892 ___lock_fhandle 105435->105436 105437 f7d8b6 105436->105437 105438 f7d89f 105436->105438 105439 f7d955 105437->105439 105441 f7d8ca 105437->105441 105536 f78af4 58 API calls __getptd_noexit 105438->105536 105542 f78af4 58 API calls __getptd_noexit 105439->105542 105444 f7d8f2 105441->105444 105445 f7d8e8 105441->105445 105443 f7d8a4 105537 f78b28 58 API calls __getptd_noexit 105443->105537 105463 f7d206 105444->105463 105538 f78af4 58 API calls __getptd_noexit 105445->105538 105446 f7d8ed 105543 f78b28 58 API calls __getptd_noexit 105446->105543 105450 f7d8f8 105452 f7d91e 105450->105452 105453 f7d90b 105450->105453 105539 f78b28 58 API calls __getptd_noexit 105452->105539 105472 f7d975 105453->105472 105454 f7d961 105544 f78db6 9 API calls __fclose_nolock 105454->105544 105458 f7d8ab ___lock_fhandle 105458->105395 105459 f7d917 105541 f7d94d LeaveCriticalSection __unlock_fhandle 105459->105541 105460 f7d923 105540 f78af4 58 API calls __getptd_noexit 105460->105540 105464 f7d212 ___lock_fhandle 105463->105464 105465 f7d261 EnterCriticalSection 105464->105465 105466 f79c0b __lock 58 API calls 105464->105466 105467 f7d287 ___lock_fhandle 105465->105467 105468 f7d237 105466->105468 105467->105450 105469 f7d24f 105468->105469 105545 f79e2b InitializeCriticalSectionAndSpinCount 105468->105545 105546 f7d28b LeaveCriticalSection _doexit 105469->105546 105473 f7d982 __ftell_nolock 105472->105473 105474 f7d9c1 105473->105474 105475 f7d9e0 105473->105475 105506 f7d9b6 105473->105506 105556 f78af4 58 API calls __getptd_noexit 105474->105556 105480 f7da38 105475->105480 105481 f7da1c 105475->105481 105476 f7c5f6 __except_handler4 6 API calls 105478 f7e1d6 105476->105478 105478->105459 105479 f7d9c6 105557 f78b28 58 API calls __getptd_noexit 105479->105557 105483 f7da51 105480->105483 105562 f818c1 60 API calls 3 library calls 105480->105562 105559 f78af4 58 API calls __getptd_noexit 105481->105559 105547 f85c6b 105483->105547 105485 f7d9cd 105558 f78db6 9 API calls __fclose_nolock 105485->105558 105488 f7da21 105560 f78b28 58 API calls __getptd_noexit 105488->105560 105490 f7da5f 105493 f7ddb8 105490->105493 105563 f799ac 58 API calls 2 library calls 105490->105563 105492 f7da28 105561 f78db6 9 API calls __fclose_nolock 105492->105561 105495 f7ddd6 105493->105495 105496 f7e14b WriteFile 105493->105496 105498 f7defa 105495->105498 105504 f7ddec 105495->105504 105499 f7ddab GetLastError 105496->105499 105508 f7dd78 105496->105508 105509 f7dfef 105498->105509 105511 f7df05 105498->105511 105499->105508 105500 f7e184 105500->105506 105568 f78b28 58 API calls __getptd_noexit 105500->105568 105501 f7da8b GetConsoleMode 105501->105493 105502 f7daca 105501->105502 105502->105493 105503 f7dada GetConsoleCP 105502->105503 105503->105500 105533 f7db09 105503->105533 105504->105500 105505 f7de5b WriteFile 105504->105505 105505->105499 105510 f7de98 105505->105510 105506->105476 105508->105500 105508->105506 105513 f7ded8 105508->105513 105509->105500 105514 f7e064 WideCharToMultiByte 105509->105514 105510->105504 105527 f7debc 105510->105527 105511->105500 105515 f7df6a WriteFile 105511->105515 105512 f7e1b2 105569 f78af4 58 API calls __getptd_noexit 105512->105569 105517 f7dee3 105513->105517 105518 f7e17b 105513->105518 105514->105499 105529 f7e0ab 105514->105529 105515->105499 105522 f7dfb9 105515->105522 105565 f78b28 58 API calls __getptd_noexit 105517->105565 105567 f78b07 58 API calls 3 library calls 105518->105567 105521 f7e0b3 WriteFile 105526 f7e106 GetLastError 105521->105526 105521->105529 105522->105508 105522->105511 105522->105527 105523 f7dee8 105566 f78af4 58 API calls __getptd_noexit 105523->105566 105526->105529 105527->105508 105528 f87a5e WriteConsoleW CreateFileW __putwch_nolock 105534 f7dc5f 105528->105534 105529->105508 105529->105509 105529->105521 105529->105527 105530 f7dbf2 WideCharToMultiByte 105530->105508 105532 f7dc2d WriteFile 105530->105532 105531 f862ba 60 API calls __write_nolock 105531->105533 105532->105499 105532->105534 105533->105508 105533->105530 105533->105531 105533->105534 105564 f735f5 58 API calls __isleadbyte_l 105533->105564 105534->105499 105534->105508 105534->105528 105534->105533 105535 f7dc87 WriteFile 105534->105535 105535->105499 105535->105534 105536->105443 105537->105458 105538->105446 105539->105460 105540->105459 105541->105458 105542->105446 105543->105454 105544->105458 105545->105469 105546->105465 105548 f85c83 105547->105548 105549 f85c76 105547->105549 105552 f85c8f 105548->105552 105553 f78b28 __calloc_impl 58 API calls 105548->105553 105550 f78b28 __calloc_impl 58 API calls 105549->105550 105551 f85c7b 105550->105551 105551->105490 105552->105490 105554 f85cb0 105553->105554 105555 f78db6 __fclose_nolock 9 API calls 105554->105555 105555->105551 105556->105479 105557->105485 105558->105506 105559->105488 105560->105492 105561->105506 105562->105483 105563->105501 105564->105533 105565->105523 105566->105506 105567->105506 105568->105512 105569->105506 105570->105404 105571->105406 105595 f7d4c3 105572->105595 105574 f80b41 105608 f7d43d 59 API calls 2 library calls 105574->105608 105576 f80aeb 105576->105574 105577 f80b1f 105576->105577 105580 f7d4c3 __close_nolock 58 API calls 105576->105580 105577->105574 105578 f7d4c3 __close_nolock 58 API calls 105577->105578 105581 f80b2b CloseHandle 105578->105581 105579 f80b49 105582 f80b6b 105579->105582 105609 f78b07 58 API calls 3 library calls 105579->105609 105583 f80b16 105580->105583 105581->105574 105584 f80b37 GetLastError 105581->105584 105582->105431 105586 f7d4c3 __close_nolock 58 API calls 105583->105586 105584->105574 105586->105577 105587->105413 105588->105428 105589->105419 105590->105431 105591->105428 105592->105419 105593->105426 105594->105428 105596 f7d4e3 105595->105596 105597 f7d4ce 105595->105597 105603 f7d508 105596->105603 105612 f78af4 58 API calls __getptd_noexit 105596->105612 105610 f78af4 58 API calls __getptd_noexit 105597->105610 105600 f7d4d3 105611 f78b28 58 API calls __getptd_noexit 105600->105611 105601 f7d512 105613 f78b28 58 API calls __getptd_noexit 105601->105613 105603->105576 105605 f7d4db 105605->105576 105606 f7d51a 105614 f78db6 9 API calls __fclose_nolock 105606->105614 105608->105579 105609->105582 105610->105600 105611->105605 105612->105601 105613->105606 105614->105605 105677 f81940 105615->105677 105618 f5477c 105620 f57bcc 59 API calls 105618->105620 105619 f54799 105683 f57d8c 105619->105683 105622 f54788 105620->105622 105679 f57726 105622->105679 105625 f70791 105626 f81940 __ftell_nolock 105625->105626 105627 f7079e GetLongPathNameW 105626->105627 105628 f57bcc 59 API calls 105627->105628 105629 f572bd 105628->105629 105630 f5700b 105629->105630 105631 f57667 59 API calls 105630->105631 105632 f5701d 105631->105632 105633 f54750 60 API calls 105632->105633 105634 f57028 105633->105634 105635 f57033 105634->105635 105636 f8e885 105634->105636 105638 f53f74 59 API calls 105635->105638 105640 f8e89f 105636->105640 105697 f57908 61 API calls 105636->105697 105639 f5703f 105638->105639 105691 f534c2 105639->105691 105642 f57052 Mailbox 105642->104743 105644 f54ddd 136 API calls 105643->105644 105645 f5688f 105644->105645 105646 f8e031 105645->105646 105648 f54ddd 136 API calls 105645->105648 105647 fb955b 122 API calls 105646->105647 105649 f8e046 105647->105649 105650 f568a3 105648->105650 105652 f8e04a 105649->105652 105653 f8e067 105649->105653 105650->105646 105651 f568ab 105650->105651 105654 f568b7 105651->105654 105655 f8e052 105651->105655 105656 f54e4a 84 API calls 105652->105656 105657 f70db6 Mailbox 59 API calls 105653->105657 105698 f56a8c 105654->105698 105791 fb42f8 90 API calls _wprintf 105655->105791 105656->105655 105676 f8e0ac Mailbox 105657->105676 105661 f8e060 105661->105653 105662 f8e260 105663 f72d55 _free 58 API calls 105662->105663 105664 f8e268 105663->105664 105665 f54e4a 84 API calls 105664->105665 105666 f8e271 105665->105666 105670 f72d55 _free 58 API calls 105666->105670 105671 f54e4a 84 API calls 105666->105671 105797 faf7a1 89 API calls 4 library calls 105666->105797 105670->105666 105671->105666 105673 f57de1 59 API calls 105673->105676 105676->105662 105676->105666 105676->105673 105792 faf73d 59 API calls 2 library calls 105676->105792 105793 faf65e 61 API calls 2 library calls 105676->105793 105794 fb737f 59 API calls Mailbox 105676->105794 105795 f5750f 59 API calls 2 library calls 105676->105795 105796 f5735d 59 API calls Mailbox 105676->105796 105678 f5475d GetFullPathNameW 105677->105678 105678->105618 105678->105619 105680 f57734 105679->105680 105687 f57d2c 105680->105687 105682 f54794 105682->105625 105684 f57da6 105683->105684 105686 f57d99 105683->105686 105685 f70db6 Mailbox 59 API calls 105684->105685 105685->105686 105686->105622 105688 f57d3a 105687->105688 105690 f57d43 _memmove 105687->105690 105689 f57e4f 59 API calls 105688->105689 105688->105690 105689->105690 105690->105682 105692 f534d4 105691->105692 105696 f534f3 _memmove 105691->105696 105694 f70db6 Mailbox 59 API calls 105692->105694 105693 f70db6 Mailbox 59 API calls 105695 f5350a 105693->105695 105694->105696 105695->105642 105696->105693 105697->105636 105699 f56ab5 105698->105699 105700 f8e41e 105698->105700 105803 f557a6 60 API calls Mailbox 105699->105803 105870 faf7a1 89 API calls 4 library calls 105700->105870 105703 f56ad7 105804 f557f6 67 API calls 105703->105804 105704 f8e431 105871 faf7a1 89 API calls 4 library calls 105704->105871 105706 f56aec 105706->105704 105708 f56af4 105706->105708 105710 f57667 59 API calls 105708->105710 105709 f8e44d 105712 f56b61 105709->105712 105711 f56b00 105710->105711 105805 f70957 60 API calls __ftell_nolock 105711->105805 105714 f8e460 105712->105714 105715 f56b6f 105712->105715 105718 f55c6f CloseHandle 105714->105718 105719 f57667 59 API calls 105715->105719 105716 f56b0c 105717 f57667 59 API calls 105716->105717 105720 f56b18 105717->105720 105721 f8e46c 105718->105721 105722 f56b78 105719->105722 105723 f54750 60 API calls 105720->105723 105724 f54ddd 136 API calls 105721->105724 105725 f57667 59 API calls 105722->105725 105726 f56b26 105723->105726 105727 f8e488 105724->105727 105728 f56b81 105725->105728 105806 f55850 ReadFile SetFilePointerEx 105726->105806 105730 f8e4b1 105727->105730 105734 fb955b 122 API calls 105727->105734 105808 f5459b 105728->105808 105872 faf7a1 89 API calls 4 library calls 105730->105872 105733 f56b52 105807 f55aee SetFilePointerEx SetFilePointerEx 105733->105807 105738 f8e4a4 105734->105738 105735 f56b98 105739 f57b2e 59 API calls 105735->105739 105736 f8e4c8 105769 f56d0c Mailbox 105736->105769 105741 f8e4ac 105738->105741 105742 f8e4cd 105738->105742 105740 f56ba9 SetCurrentDirectoryW 105739->105740 105747 f56bbc Mailbox 105740->105747 105744 f54e4a 84 API calls 105741->105744 105743 f54e4a 84 API calls 105742->105743 105745 f8e4d2 105743->105745 105744->105730 105746 f70db6 Mailbox 59 API calls 105745->105746 105753 f8e506 105746->105753 105749 f70db6 Mailbox 59 API calls 105747->105749 105751 f56bcf 105749->105751 105750 f53bbb 105750->104610 105750->104633 105752 f5522e 59 API calls 105751->105752 105779 f56bda Mailbox __wsetenvp 105752->105779 105873 f5750f 59 API calls 2 library calls 105753->105873 105755 f56ce7 105866 f55c6f 105755->105866 105758 f8e740 105879 fb72df 59 API calls Mailbox 105758->105879 105759 f56cf3 SetCurrentDirectoryW 105759->105769 105762 f8e762 105880 fcfbce 59 API calls 2 library calls 105762->105880 105765 f8e76f 105767 f72d55 _free 58 API calls 105765->105767 105766 f8e7d9 105883 faf7a1 89 API calls 4 library calls 105766->105883 105767->105769 105798 f557d4 105769->105798 105772 f8e7f2 105772->105755 105774 f8e7d1 105882 faf5f7 59 API calls 4 library calls 105774->105882 105777 f57de1 59 API calls 105777->105779 105779->105755 105779->105766 105779->105774 105779->105777 105859 f5586d 67 API calls _wcscpy 105779->105859 105860 f56f5d GetStringTypeW 105779->105860 105861 f56ecc 60 API calls __wcsnicmp 105779->105861 105862 f56faa GetStringTypeW __wsetenvp 105779->105862 105863 f7363d GetStringTypeW _iswctype 105779->105863 105864 f568dc 165 API calls 3 library calls 105779->105864 105865 f57213 59 API calls Mailbox 105779->105865 105781 f8e54f Mailbox 105781->105758 105782 f57de1 59 API calls 105781->105782 105786 f8e792 105781->105786 105874 faf73d 59 API calls 2 library calls 105781->105874 105875 faf65e 61 API calls 2 library calls 105781->105875 105876 fb737f 59 API calls Mailbox 105781->105876 105877 f5750f 59 API calls 2 library calls 105781->105877 105878 f57213 59 API calls Mailbox 105781->105878 105782->105781 105881 faf7a1 89 API calls 4 library calls 105786->105881 105788 f8e7ab 105789 f72d55 _free 58 API calls 105788->105789 105790 f8e7be 105789->105790 105790->105769 105791->105661 105792->105676 105793->105676 105794->105676 105795->105676 105796->105676 105797->105666 105799 f55c6f CloseHandle 105798->105799 105800 f557dc Mailbox 105799->105800 105801 f55c6f CloseHandle 105800->105801 105802 f557eb 105801->105802 105802->105750 105803->105703 105804->105706 105805->105716 105806->105733 105807->105712 105809 f57667 59 API calls 105808->105809 105810 f545b1 105809->105810 105811 f57667 59 API calls 105810->105811 105812 f545b9 105811->105812 105813 f57667 59 API calls 105812->105813 105814 f545c1 105813->105814 105815 f57667 59 API calls 105814->105815 105816 f545c9 105815->105816 105817 f545fd 105816->105817 105818 f8d4d2 105816->105818 105819 f5784b 59 API calls 105817->105819 105820 f58047 59 API calls 105818->105820 105821 f5460b 105819->105821 105822 f8d4db 105820->105822 105823 f57d2c 59 API calls 105821->105823 105824 f57d8c 59 API calls 105822->105824 105825 f54615 105823->105825 105827 f54640 105824->105827 105826 f5784b 59 API calls 105825->105826 105825->105827 105830 f54636 105826->105830 105828 f54680 105827->105828 105831 f5465f 105827->105831 105841 f8d4fb 105827->105841 105884 f5784b 105828->105884 105833 f57d2c 59 API calls 105830->105833 105835 f579f2 59 API calls 105831->105835 105832 f54691 105836 f546a3 105832->105836 105839 f58047 59 API calls 105832->105839 105833->105827 105834 f8d5cb 105837 f57bcc 59 API calls 105834->105837 105838 f54669 105835->105838 105840 f546b3 105836->105840 105843 f58047 59 API calls 105836->105843 105854 f8d588 105837->105854 105838->105828 105842 f5784b 59 API calls 105838->105842 105839->105836 105845 f546ba 105840->105845 105846 f58047 59 API calls 105840->105846 105841->105834 105844 f8d5b4 105841->105844 105853 f8d532 105841->105853 105842->105828 105843->105840 105844->105834 105849 f8d59f 105844->105849 105847 f58047 59 API calls 105845->105847 105856 f546c1 Mailbox 105845->105856 105846->105845 105847->105856 105848 f579f2 59 API calls 105848->105854 105851 f57bcc 59 API calls 105849->105851 105850 f8d590 105852 f57bcc 59 API calls 105850->105852 105851->105854 105852->105854 105853->105850 105857 f8d57b 105853->105857 105854->105828 105854->105848 105897 f57924 59 API calls 2 library calls 105854->105897 105856->105735 105858 f57bcc 59 API calls 105857->105858 105858->105854 105859->105779 105860->105779 105861->105779 105862->105779 105863->105779 105864->105779 105865->105779 105867 f55c79 105866->105867 105868 f55c88 105866->105868 105867->105759 105868->105867 105869 f55c8d CloseHandle 105868->105869 105869->105867 105870->105704 105871->105709 105872->105736 105873->105781 105874->105781 105875->105781 105876->105781 105877->105781 105878->105781 105879->105762 105880->105765 105881->105788 105882->105766 105883->105772 105885 f578b7 105884->105885 105886 f5785a 105884->105886 105887 f57d2c 59 API calls 105885->105887 105886->105885 105888 f57865 105886->105888 105894 f57888 _memmove 105887->105894 105889 f8eb09 105888->105889 105890 f57880 105888->105890 105899 f58029 105889->105899 105898 f57f27 59 API calls Mailbox 105890->105898 105893 f8eb13 105895 f70db6 Mailbox 59 API calls 105893->105895 105894->105832 105896 f8eb33 105895->105896 105897->105854 105898->105894 105900 f70db6 Mailbox 59 API calls 105899->105900 105901 f58033 105900->105901 105901->105893 105902->104754 105904 f56d95 105903->105904 105909 f56ea9 105903->105909 105905 f70db6 Mailbox 59 API calls 105904->105905 105904->105909 105906 f56dbc 105905->105906 105907 f70db6 Mailbox 59 API calls 105906->105907 105913 f56e31 105907->105913 105909->104758 105913->105909 105916 f56240 105913->105916 105941 f5735d 59 API calls Mailbox 105913->105941 105942 fa6553 59 API calls Mailbox 105913->105942 105943 f5750f 59 API calls 2 library calls 105913->105943 105914->104760 105915->104762 105944 f57a16 105916->105944 105918 f5646a 105951 f5750f 59 API calls 2 library calls 105918->105951 105920 f56484 Mailbox 105920->105913 105923 f8dff6 105954 faf8aa 91 API calls 4 library calls 105923->105954 105924 f56799 _memmove 105956 faf8aa 91 API calls 4 library calls 105924->105956 105925 f5750f 59 API calls 105933 f56265 105925->105933 105929 f57d8c 59 API calls 105929->105933 105930 f8e004 105955 f5750f 59 API calls 2 library calls 105930->105955 105932 f8e01a 105932->105920 105933->105918 105933->105923 105933->105924 105933->105925 105933->105929 105934 f8df92 105933->105934 105938 f57e4f 59 API calls 105933->105938 105949 f55f6c 60 API calls 105933->105949 105950 f55d41 59 API calls Mailbox 105933->105950 105952 f55e72 60 API calls 105933->105952 105953 f57924 59 API calls 2 library calls 105933->105953 105935 f58029 59 API calls 105934->105935 105936 f8df9d 105935->105936 105940 f70db6 Mailbox 59 API calls 105936->105940 105939 f5643b CharUpperBuffW 105938->105939 105939->105933 105940->105924 105941->105913 105942->105913 105943->105913 105945 f70db6 Mailbox 59 API calls 105944->105945 105946 f57a3b 105945->105946 105947 f58029 59 API calls 105946->105947 105948 f57a4a 105947->105948 105948->105933 105949->105933 105950->105933 105951->105920 105952->105933 105953->105933 105954->105930 105955->105932 105956->105920 105957->104776 105958->104777 105960 f54196 105959->105960 105961 f8d423 105959->105961 105960->104783 105985 fb2f94 62 API calls _W_store_winword 105960->105985 105961->105960 105962 f8d42c DestroyIcon 105961->105962 105962->105960 105964 f5416f Mailbox 105963->105964 105965 f54098 105963->105965 105964->104789 105966 f57a16 59 API calls 105965->105966 105967 f540a6 105966->105967 105968 f8d3c8 LoadStringW 105967->105968 105969 f540b3 105967->105969 105972 f8d3e2 105968->105972 105970 f57bcc 59 API calls 105969->105970 105971 f540c8 105970->105971 105971->105972 105973 f540d9 105971->105973 105974 f57b2e 59 API calls 105972->105974 105975 f54174 105973->105975 105976 f540e3 105973->105976 105979 f8d3ec 105974->105979 105977 f58047 59 API calls 105975->105977 105978 f57b2e 59 API calls 105976->105978 105982 f540ed _memset _wcscpy 105977->105982 105978->105982 105980 f57cab 59 API calls 105979->105980 105979->105982 105981 f8d40e 105980->105981 105984 f57cab 59 API calls 105981->105984 105983 f54155 Shell_NotifyIconW 105982->105983 105983->105964 105984->105982 105985->104783 105987 f5e6d5 105986->105987 105988 f93aa9 105987->105988 105991 f5e73f 105987->105991 105995 f5e799 105987->105995 106077 f59ea0 105988->106077 105990 f93abe 106016 f5e970 Mailbox 105990->106016 106101 fb9e4a 89 API calls 4 library calls 105990->106101 105994 f57667 59 API calls 105991->105994 105991->105995 105992 f57667 59 API calls 105992->105995 105996 f93b04 105994->105996 105995->105992 105997 f72d40 __cinit 67 API calls 105995->105997 105998 f93b26 105995->105998 106003 f5e95a 105995->106003 105995->106016 105999 f72d40 __cinit 67 API calls 105996->105999 105997->105995 105998->104865 105999->105995 106000 fb9e4a 89 API calls 106000->106016 106001 f584c0 69 API calls 106001->106016 106002 f59ea0 341 API calls 106002->106016 106003->106016 106102 fb9e4a 89 API calls 4 library calls 106003->106102 106008 f58d40 59 API calls 106008->106016 106012 f5f195 106106 fb9e4a 89 API calls 4 library calls 106012->106106 106014 f93e25 106014->104865 106015 f5ea78 106015->104865 106016->106000 106016->106001 106016->106002 106016->106008 106016->106012 106016->106015 106076 f57f77 59 API calls 2 library calls 106016->106076 106103 fa6e8f 59 API calls 106016->106103 106104 fcc5c3 341 API calls 106016->106104 106105 fcb53c 341 API calls Mailbox 106016->106105 106107 f59c90 59 API calls Mailbox 106016->106107 106108 fc93c6 341 API calls Mailbox 106016->106108 106018 f5f650 106017->106018 106019 f5f4ba 106017->106019 106022 f57de1 59 API calls 106018->106022 106020 f5f4c6 106019->106020 106021 f9441e 106019->106021 106210 f5f290 341 API calls 2 library calls 106020->106210 106212 fcbc6b 341 API calls Mailbox 106021->106212 106028 f5f58c Mailbox 106022->106028 106025 f9442c 106029 f5f630 106025->106029 106213 fb9e4a 89 API calls 4 library calls 106025->106213 106027 f5f4fd 106027->106025 106027->106028 106027->106029 106115 fc445a 106028->106115 106124 fbcb7a 106028->106124 106204 fcdf37 106028->106204 106207 fb3c37 106028->106207 106029->104865 106031 f5f5e3 106031->106029 106211 f59c90 59 API calls Mailbox 106031->106211 106036->104865 106037->104865 106038->104865 106039->104795 106040->104800 106041->104865 106042->104802 106043->104802 106044->104802 106045->104865 106046->104865 106047->104865 106049 f59851 106048->106049 106050 f5984b 106048->106050 106051 f8f5d3 __i64tow 106049->106051 106052 f59899 106049->106052 106054 f59857 __itow 106049->106054 106057 f8f4da 106049->106057 106050->104865 106461 f73698 83 API calls 4 library calls 106052->106461 106056 f70db6 Mailbox 59 API calls 106054->106056 106058 f59871 106056->106058 106059 f8f552 Mailbox _wcscpy 106057->106059 106060 f70db6 Mailbox 59 API calls 106057->106060 106058->106050 106061 f57de1 59 API calls 106058->106061 106462 f73698 83 API calls 4 library calls 106059->106462 106062 f8f51f 106060->106062 106061->106050 106063 f70db6 Mailbox 59 API calls 106062->106063 106064 f8f545 106063->106064 106064->106059 106065 f57de1 59 API calls 106064->106065 106065->106059 106066->104865 106067->104865 106068->104865 106069->104851 106070->104851 106071->104851 106072->104851 106073->104851 106074->104851 106075->104851 106076->106016 106078 f59ebf 106077->106078 106098 f59eed Mailbox 106077->106098 106079 f70db6 Mailbox 59 API calls 106078->106079 106079->106098 106080 f72d40 67 API calls __cinit 106080->106098 106081 f5b475 106082 f58047 59 API calls 106081->106082 106091 f5a057 106082->106091 106083 fa6e8f 59 API calls 106083->106098 106084 f5b47a 106085 f909e5 106084->106085 106086 f90055 106084->106086 106114 fb9e4a 89 API calls 4 library calls 106085->106114 106111 fb9e4a 89 API calls 4 library calls 106086->106111 106087 f5a55a 106112 fb9e4a 89 API calls 4 library calls 106087->106112 106091->105990 106092 f90064 106092->105990 106093 f70db6 59 API calls Mailbox 106093->106098 106096 f58047 59 API calls 106096->106098 106097 f57667 59 API calls 106097->106098 106098->106080 106098->106081 106098->106083 106098->106084 106098->106086 106098->106087 106098->106091 106098->106093 106098->106096 106098->106097 106099 f909d6 106098->106099 106109 f5c8c0 341 API calls 2 library calls 106098->106109 106110 f5b900 60 API calls Mailbox 106098->106110 106113 fb9e4a 89 API calls 4 library calls 106099->106113 106101->106016 106102->106016 106103->106016 106104->106016 106105->106016 106106->106014 106107->106016 106108->106016 106109->106098 106110->106098 106111->106092 106112->106091 106113->106085 106114->106091 106116 f59837 84 API calls 106115->106116 106117 fc4494 106116->106117 106118 f56240 94 API calls 106117->106118 106119 fc44a4 106118->106119 106120 fc44c9 106119->106120 106121 f59ea0 341 API calls 106119->106121 106123 fc44cd 106120->106123 106214 f59a98 59 API calls Mailbox 106120->106214 106121->106120 106123->106031 106125 f57667 59 API calls 106124->106125 106126 fbcbaf 106125->106126 106127 f57667 59 API calls 106126->106127 106128 fbcbb8 106127->106128 106129 fbcbcc 106128->106129 106324 f59b3c 59 API calls 106128->106324 106131 f59837 84 API calls 106129->106131 106132 fbcbe9 106131->106132 106133 fbcc0b 106132->106133 106134 fbccea 106132->106134 106146 fbcd1a Mailbox 106132->106146 106135 f59837 84 API calls 106133->106135 106136 f54ddd 136 API calls 106134->106136 106137 fbcc17 106135->106137 106138 fbccfe 106136->106138 106139 f58047 59 API calls 106137->106139 106140 fbcd16 106138->106140 106143 f54ddd 136 API calls 106138->106143 106142 fbcc23 106139->106142 106141 f57667 59 API calls 106140->106141 106140->106146 106144 fbcd4b 106141->106144 106148 fbcc69 106142->106148 106149 fbcc37 106142->106149 106143->106140 106145 f57667 59 API calls 106144->106145 106147 fbcd54 106145->106147 106146->106031 106151 f57667 59 API calls 106147->106151 106150 f59837 84 API calls 106148->106150 106152 f58047 59 API calls 106149->106152 106153 fbcc76 106150->106153 106154 fbcd5d 106151->106154 106155 fbcc47 106152->106155 106156 f58047 59 API calls 106153->106156 106157 f57667 59 API calls 106154->106157 106158 f57cab 59 API calls 106155->106158 106159 fbcc82 106156->106159 106160 fbcd66 106157->106160 106161 fbcc51 106158->106161 106325 fb4a31 GetFileAttributesW 106159->106325 106163 f59837 84 API calls 106160->106163 106164 f59837 84 API calls 106161->106164 106167 fbcd73 106163->106167 106165 fbcc5d 106164->106165 106168 f57b2e 59 API calls 106165->106168 106166 fbcc8b 106169 fbcc9e 106166->106169 106172 f579f2 59 API calls 106166->106172 106170 f5459b 59 API calls 106167->106170 106168->106148 106171 f59837 84 API calls 106169->106171 106178 fbcca4 106169->106178 106173 fbcd8e 106170->106173 106174 fbcccb 106171->106174 106172->106169 106175 f579f2 59 API calls 106173->106175 106326 fb37ef 75 API calls Mailbox 106174->106326 106177 fbcd9d 106175->106177 106179 fbcdd1 106177->106179 106180 f579f2 59 API calls 106177->106180 106178->106146 106181 f58047 59 API calls 106179->106181 106182 fbcdae 106180->106182 106183 fbcddf 106181->106183 106182->106179 106185 f57bcc 59 API calls 106182->106185 106184 f57b2e 59 API calls 106183->106184 106186 fbcded 106184->106186 106187 fbcdc3 106185->106187 106188 f57b2e 59 API calls 106186->106188 106189 f57bcc 59 API calls 106187->106189 106190 fbcdfb 106188->106190 106189->106179 106191 f57b2e 59 API calls 106190->106191 106192 fbce09 106191->106192 106193 f59837 84 API calls 106192->106193 106194 fbce15 106193->106194 106215 fb4071 106194->106215 106196 fbce26 106197 fb3c37 3 API calls 106196->106197 106198 fbce30 106197->106198 106199 f59837 84 API calls 106198->106199 106203 fbce61 106198->106203 106200 fbce4e 106199->106200 106269 fb9155 106200->106269 106202 f54e4a 84 API calls 106202->106146 106203->106202 106367 fccadd 106204->106367 106206 fcdf47 106206->106031 106457 fb445a GetFileAttributesW 106207->106457 106210->106027 106211->106031 106212->106025 106213->106029 106214->106123 106216 fb408d 106215->106216 106217 fb4092 106216->106217 106218 fb40a0 106216->106218 106220 f58047 59 API calls 106217->106220 106219 f57667 59 API calls 106218->106219 106221 fb40a8 106219->106221 106268 fb409b Mailbox 106220->106268 106222 f57667 59 API calls 106221->106222 106223 fb40b0 106222->106223 106224 f57667 59 API calls 106223->106224 106225 fb40bb 106224->106225 106226 f57667 59 API calls 106225->106226 106227 fb40c3 106226->106227 106228 f57667 59 API calls 106227->106228 106229 fb40cb 106228->106229 106230 f57667 59 API calls 106229->106230 106231 fb40d3 106230->106231 106232 f57667 59 API calls 106231->106232 106233 fb40db 106232->106233 106234 f57667 59 API calls 106233->106234 106235 fb40e3 106234->106235 106236 f5459b 59 API calls 106235->106236 106237 fb40fa 106236->106237 106238 f5459b 59 API calls 106237->106238 106239 fb4113 106238->106239 106240 f579f2 59 API calls 106239->106240 106241 fb411f 106240->106241 106242 fb4132 106241->106242 106243 f57d2c 59 API calls 106241->106243 106244 f579f2 59 API calls 106242->106244 106243->106242 106245 fb413b 106244->106245 106246 fb414b 106245->106246 106247 f57d2c 59 API calls 106245->106247 106248 f58047 59 API calls 106246->106248 106247->106246 106249 fb4157 106248->106249 106250 f57b2e 59 API calls 106249->106250 106251 fb4163 106250->106251 106327 fb4223 59 API calls 106251->106327 106253 fb4172 106328 fb4223 59 API calls 106253->106328 106255 fb4185 106256 f579f2 59 API calls 106255->106256 106257 fb418f 106256->106257 106258 fb41a6 106257->106258 106259 fb4194 106257->106259 106261 f579f2 59 API calls 106258->106261 106260 f57cab 59 API calls 106259->106260 106262 fb41a1 106260->106262 106263 fb41af 106261->106263 106264 fb41cd 106263->106264 106268->106196 106270 fb9162 __ftell_nolock 106269->106270 106271 f70db6 Mailbox 59 API calls 106270->106271 106272 fb91bf 106271->106272 106273 f5522e 59 API calls 106272->106273 106274 fb91c9 106273->106274 106275 fb8f5f GetSystemTimeAsFileTime 106274->106275 106276 fb91d4 106275->106276 106277 f54ee5 85 API calls 106276->106277 106278 fb91e7 _wcscmp 106277->106278 106279 fb920b 106278->106279 106280 fb92b8 106278->106280 106281 fb9734 96 API calls 106279->106281 106282 fb9734 96 API calls 106280->106282 106283 fb9210 106281->106283 106297 fb9284 _wcscat 106282->106297 106286 fb92c1 106283->106286 106346 f740fb 58 API calls __wsplitpath_helper 106283->106346 106285 f54f0b 74 API calls 106287 fb92dd 106285->106287 106286->106203 106288 f54f0b 74 API calls 106287->106288 106290 fb92ed 106288->106290 106289 fb9239 _wcscat _wcscpy 106347 f740fb 58 API calls __wsplitpath_helper 106289->106347 106291 f54f0b 74 API calls 106290->106291 106293 fb9308 106291->106293 106294 f54f0b 74 API calls 106293->106294 106295 fb9318 106294->106295 106296 f54f0b 74 API calls 106295->106296 106298 fb9333 106296->106298 106297->106285 106297->106286 106299 f54f0b 74 API calls 106298->106299 106300 fb9343 106299->106300 106301 f54f0b 74 API calls 106300->106301 106302 fb9353 106301->106302 106303 f54f0b 74 API calls 106302->106303 106304 fb9363 106303->106304 106329 fb98e3 GetTempPathW GetTempFileNameW 106304->106329 106306 fb936f 106307 f7525b 115 API calls 106306->106307 106318 fb9380 106307->106318 106318->106286 106324->106129 106325->106166 106326->106178 106327->106253 106328->106255 106329->106306 106346->106289 106347->106297 106368 f59837 84 API calls 106367->106368 106369 fccb1a 106368->106369 106372 fccb61 Mailbox 106369->106372 106405 fcd7a5 106369->106405 106371 fccf2e 106444 fcd8c8 92 API calls Mailbox 106371->106444 106372->106206 106375 fccbb2 Mailbox 106375->106372 106378 f59837 84 API calls 106375->106378 106391 fccdb9 106375->106391 106437 fcfbce 59 API calls 2 library calls 106375->106437 106438 fccfdf 61 API calls 2 library calls 106375->106438 106376 fccf3d 106377 fccdc7 106376->106377 106379 fccf49 106376->106379 106418 fcc96e 106377->106418 106378->106375 106379->106372 106384 fcce00 106433 f70c08 106384->106433 106387 fcce1a 106439 fb9e4a 89 API calls 4 library calls 106387->106439 106388 fcce33 106389 f592ce 59 API calls 106388->106389 106392 fcce3f 106389->106392 106391->106371 106391->106377 106394 f59050 59 API calls 106392->106394 106393 fcce25 GetCurrentProcess TerminateProcess 106393->106388 106395 fcce55 106394->106395 106403 fcce7c 106395->106403 106440 f58d40 59 API calls Mailbox 106395->106440 106397 fccfa4 106397->106372 106401 fccfb8 FreeLibrary 106397->106401 106398 fcce6b 106441 fcd649 107 API calls _free 106398->106441 106401->106372 106403->106397 106442 f58d40 59 API calls Mailbox 106403->106442 106443 f59d3c 60 API calls Mailbox 106403->106443 106445 fcd649 107 API calls _free 106403->106445 106406 f57e4f 59 API calls 106405->106406 106407 fcd7c0 CharLowerBuffW 106406->106407 106446 faf167 106407->106446 106411 f57667 59 API calls 106412 fcd7f9 106411->106412 106413 f5784b 59 API calls 106412->106413 106414 fcd810 106413->106414 106415 f57d2c 59 API calls 106414->106415 106416 fcd81c Mailbox 106415->106416 106417 fcd858 Mailbox 106416->106417 106453 fccfdf 61 API calls 2 library calls 106416->106453 106417->106375 106419 fcc989 106418->106419 106423 fcc9de 106418->106423 106420 f70db6 Mailbox 59 API calls 106419->106420 106422 fcc9ab 106420->106422 106421 f70db6 Mailbox 59 API calls 106421->106422 106422->106421 106422->106423 106424 fcda50 106423->106424 106425 fcdc79 Mailbox 106424->106425 106432 fcda73 _strcat _wcscpy __wsetenvp 106424->106432 106425->106384 106426 f59be6 59 API calls 106426->106432 106427 f59b3c 59 API calls 106427->106432 106428 f59b98 59 API calls 106428->106432 106429 f59837 84 API calls 106429->106432 106430 f7571c 58 API calls __crtGetStringTypeA_stat 106430->106432 106432->106425 106432->106426 106432->106427 106432->106428 106432->106429 106432->106430 106456 fb5887 61 API calls 2 library calls 106432->106456 106435 f70c1d 106433->106435 106434 f70cb5 VirtualProtect 106436 f70c83 106434->106436 106435->106434 106435->106436 106436->106387 106436->106388 106437->106375 106438->106375 106439->106393 106440->106398 106441->106403 106442->106403 106443->106403 106444->106376 106445->106403 106448 faf192 __wsetenvp 106446->106448 106447 faf1d1 106447->106411 106447->106416 106448->106447 106451 faf1c7 106448->106451 106452 faf278 106448->106452 106451->106447 106454 f578c4 61 API calls 106451->106454 106452->106447 106455 f578c4 61 API calls 106452->106455 106453->106417 106454->106451 106455->106452 106456->106432 106458 fb3c3e 106457->106458 106459 fb4475 FindFirstFileW 106457->106459 106458->106031 106459->106458 106460 fb448a FindClose 106459->106460 106460->106458 106461->106054 106462->106051 106464 f57c5f __wsetenvp 106463->106464 106465 f58029 59 API calls 106464->106465 106466 f57c70 _memmove 106464->106466 106467 f8ed07 _memmove 106465->106467 106466->104887 106469 f57a5f 106468->106469 106473 f57a85 _memmove 106468->106473 106470 f70db6 Mailbox 59 API calls 106469->106470 106469->106473 106471 f57ad4 106470->106471 106472 f70db6 Mailbox 59 API calls 106471->106472 106472->106473 106473->104893 106474->104894 106475 f51066 106480 f5f76f 106475->106480 106477 f5106c 106478 f72d40 __cinit 67 API calls 106477->106478 106479 f51076 106478->106479 106481 f5f790 106480->106481 106513 f6ff03 106481->106513 106485 f5f7d7 106486 f57667 59 API calls 106485->106486 106487 f5f7e1 106486->106487 106488 f57667 59 API calls 106487->106488 106489 f5f7eb 106488->106489 106490 f57667 59 API calls 106489->106490 106491 f5f7f5 106490->106491 106492 f57667 59 API calls 106491->106492 106493 f5f833 106492->106493 106494 f57667 59 API calls 106493->106494 106495 f5f8fe 106494->106495 106523 f65f87 106495->106523 106499 f5f930 106500 f57667 59 API calls 106499->106500 106501 f5f93a 106500->106501 106551 f6fd9e 106501->106551 106503 f5f981 106504 f5f991 GetStdHandle 106503->106504 106505 f945ab 106504->106505 106506 f5f9dd 106504->106506 106505->106506 106508 f945b4 106505->106508 106507 f5f9e5 OleInitialize 106506->106507 106507->106477 106558 fb6b38 64 API calls Mailbox 106508->106558 106510 f945bb 106559 fb7207 CreateThread 106510->106559 106512 f945c7 CloseHandle 106512->106507 106560 f6ffdc 106513->106560 106516 f6ffdc 59 API calls 106517 f6ff45 106516->106517 106518 f57667 59 API calls 106517->106518 106519 f6ff51 106518->106519 106520 f57bcc 59 API calls 106519->106520 106521 f5f796 106520->106521 106522 f70162 6 API calls 106521->106522 106522->106485 106524 f57667 59 API calls 106523->106524 106525 f65f97 106524->106525 106526 f57667 59 API calls 106525->106526 106527 f65f9f 106526->106527 106567 f65a9d 106527->106567 106530 f65a9d 59 API calls 106531 f65faf 106530->106531 106532 f57667 59 API calls 106531->106532 106533 f65fba 106532->106533 106534 f70db6 Mailbox 59 API calls 106533->106534 106535 f5f908 106534->106535 106536 f660f9 106535->106536 106537 f66107 106536->106537 106538 f57667 59 API calls 106537->106538 106539 f66112 106538->106539 106540 f57667 59 API calls 106539->106540 106541 f6611d 106540->106541 106542 f57667 59 API calls 106541->106542 106543 f66128 106542->106543 106544 f57667 59 API calls 106543->106544 106545 f66133 106544->106545 106546 f65a9d 59 API calls 106545->106546 106547 f6613e 106546->106547 106548 f70db6 Mailbox 59 API calls 106547->106548 106549 f66145 RegisterWindowMessageW 106548->106549 106549->106499 106552 fa576f 106551->106552 106553 f6fdae 106551->106553 106570 fb9ae7 60 API calls 106552->106570 106555 f70db6 Mailbox 59 API calls 106553->106555 106557 f6fdb6 106555->106557 106556 fa577a 106557->106503 106558->106510 106559->106512 106571 fb71ed 65 API calls 106559->106571 106561 f57667 59 API calls 106560->106561 106562 f6ffe7 106561->106562 106563 f57667 59 API calls 106562->106563 106564 f6ffef 106563->106564 106565 f57667 59 API calls 106564->106565 106566 f6ff3b 106565->106566 106566->106516 106568 f57667 59 API calls 106567->106568 106569 f65aa5 106568->106569 106569->106530 106570->106556 106572 f51016 106577 f54974 106572->106577 106575 f72d40 __cinit 67 API calls 106576 f51025 106575->106576 106578 f70db6 Mailbox 59 API calls 106577->106578 106579 f5497c 106578->106579 106580 f5101b 106579->106580 106584 f54936 106579->106584 106580->106575 106585 f5493f 106584->106585 106587 f54951 106584->106587 106586 f72d40 __cinit 67 API calls 106585->106586 106586->106587 106588 f549a0 106587->106588 106589 f57667 59 API calls 106588->106589 106590 f549b8 GetVersionExW 106589->106590 106591 f57bcc 59 API calls 106590->106591 106592 f549fb 106591->106592 106593 f57d2c 59 API calls 106592->106593 106602 f54a28 106592->106602 106594 f54a1c 106593->106594 106595 f57726 59 API calls 106594->106595 106595->106602 106596 f54a93 GetCurrentProcess IsWow64Process 106597 f54aac 106596->106597 106599 f54ac2 106597->106599 106600 f54b2b GetSystemInfo 106597->106600 106598 f8d864 106612 f54b37 106599->106612 106601 f54af8 106600->106601 106601->106580 106602->106596 106602->106598 106605 f54ad4 106608 f54b37 2 API calls 106605->106608 106606 f54b1f GetSystemInfo 106607 f54ae9 106606->106607 106607->106601 106609 f54aef FreeLibrary 106607->106609 106610 f54adc GetNativeSystemInfo 106608->106610 106609->106601 106610->106607 106613 f54ad0 106612->106613 106614 f54b40 LoadLibraryA 106612->106614 106613->106605 106613->106606 106614->106613 106615 f54b51 GetProcAddress 106614->106615 106615->106613 106616 f8fdfc 106649 f5ab30 Mailbox _memmove 106616->106649 106621 f5b525 106679 fb9e4a 89 API calls 4 library calls 106621->106679 106623 f70db6 59 API calls Mailbox 106641 f59f37 Mailbox 106623->106641 106624 f90055 106678 fb9e4a 89 API calls 4 library calls 106624->106678 106628 f5b475 106630 f58047 59 API calls 106628->106630 106629 f90064 106638 f5a057 106630->106638 106631 f5b47a 106631->106624 106644 f909e5 106631->106644 106635 f57667 59 API calls 106635->106641 106636 f58047 59 API calls 106636->106641 106637 fa6e8f 59 API calls 106637->106641 106639 f72d40 67 API calls __cinit 106639->106641 106640 f57de1 59 API calls 106640->106649 106641->106623 106641->106624 106641->106628 106641->106631 106641->106635 106641->106636 106641->106637 106641->106638 106641->106639 106642 f909d6 106641->106642 106645 f5a55a 106641->106645 106667 f5c8c0 341 API calls 2 library calls 106641->106667 106668 f5b900 60 API calls Mailbox 106641->106668 106684 fb9e4a 89 API calls 4 library calls 106642->106684 106685 fb9e4a 89 API calls 4 library calls 106644->106685 106683 fb9e4a 89 API calls 4 library calls 106645->106683 106648 f70db6 59 API calls Mailbox 106648->106649 106649->106621 106649->106638 106649->106640 106649->106641 106649->106648 106650 f59ea0 341 API calls 106649->106650 106652 f9086a 106649->106652 106654 f90878 106649->106654 106655 f9085c 106649->106655 106657 f5b21c 106649->106657 106660 fa6e8f 59 API calls 106649->106660 106662 f5b2b6 106649->106662 106664 fcdf23 106649->106664 106669 f59c90 59 API calls Mailbox 106649->106669 106673 fcc193 85 API calls 2 library calls 106649->106673 106674 fcc2e0 96 API calls Mailbox 106649->106674 106675 fb7956 59 API calls Mailbox 106649->106675 106676 fcbc6b 341 API calls Mailbox 106649->106676 106677 fa617e 59 API calls Mailbox 106649->106677 106650->106649 106681 f59c90 59 API calls Mailbox 106652->106681 106682 fb9e4a 89 API calls 4 library calls 106654->106682 106655->106638 106680 fa617e 59 API calls Mailbox 106655->106680 106670 f59d3c 60 API calls Mailbox 106657->106670 106659 f5b22d 106671 f59d3c 60 API calls Mailbox 106659->106671 106660->106649 106672 f5f6a3 341 API calls 106662->106672 106665 fccadd 130 API calls 106664->106665 106666 fcdf33 106665->106666 106666->106649 106667->106641 106668->106641 106669->106649 106670->106659 106671->106662 106672->106621 106673->106649 106674->106649 106675->106649 106676->106649 106677->106649 106678->106629 106679->106655 106680->106638 106681->106655 106682->106655 106683->106638 106684->106644 106685->106638 106686 f53633 106687 f5366a 106686->106687 106688 f536e7 106687->106688 106689 f53688 106687->106689 106727 f536e5 106687->106727 106691 f8d0cc 106688->106691 106692 f536ed 106688->106692 106693 f53695 106689->106693 106694 f5374b PostQuitMessage 106689->106694 106690 f536ca DefWindowProcW 106695 f536d8 106690->106695 106735 f61070 10 API calls Mailbox 106691->106735 106696 f53715 SetTimer RegisterWindowMessageW 106692->106696 106697 f536f2 106692->106697 106699 f536a0 106693->106699 106700 f8d154 106693->106700 106694->106695 106696->106695 106705 f5373e CreatePopupMenu 106696->106705 106702 f8d06f 106697->106702 106703 f536f9 KillTimer 106697->106703 106706 f53755 106699->106706 106707 f536a8 106699->106707 106740 fb2527 71 API calls _memset 106700->106740 106712 f8d0a8 MoveWindow 106702->106712 106713 f8d074 106702->106713 106731 f5443a Shell_NotifyIconW _memset 106703->106731 106704 f8d0f3 106736 f61093 341 API calls Mailbox 106704->106736 106705->106695 106733 f544a0 64 API calls _memset 106706->106733 106708 f8d139 106707->106708 106709 f536b3 106707->106709 106708->106690 106739 fa7c36 59 API calls Mailbox 106708->106739 106716 f536be 106709->106716 106717 f8d124 106709->106717 106710 f8d166 106710->106690 106710->106695 106712->106695 106719 f8d078 106713->106719 106720 f8d097 SetFocus 106713->106720 106716->106690 106737 f5443a Shell_NotifyIconW _memset 106716->106737 106738 fb2d36 81 API calls _memset 106717->106738 106718 f53764 106718->106695 106719->106716 106722 f8d081 106719->106722 106720->106695 106721 f5370c 106732 f53114 DeleteObject DestroyWindow Mailbox 106721->106732 106734 f61070 10 API calls Mailbox 106722->106734 106727->106690 106729 f8d118 106730 f5434a 68 API calls 106729->106730 106730->106727 106731->106721 106732->106695 106733->106718 106734->106695 106735->106704 106736->106716 106737->106729 106738->106718 106739->106727 106740->106710 106741 f9416f 106745 fa5fe6 106741->106745 106743 f9417a 106744 fa5fe6 85 API calls 106743->106744 106744->106743 106746 fa6020 106745->106746 106751 fa5ff3 106745->106751 106746->106743 106747 fa6022 106757 f59328 84 API calls Mailbox 106747->106757 106749 fa6027 106750 f59837 84 API calls 106749->106750 106752 fa602e 106750->106752 106751->106746 106751->106747 106751->106749 106754 fa601a 106751->106754 106753 f57b2e 59 API calls 106752->106753 106753->106746 106756 f595a0 59 API calls _wcsstr 106754->106756 106756->106746 106757->106749 106758 fb8d0d 106759 fb8d1a 106758->106759 106760 fb8d20 106758->106760 106761 f72d55 _free 58 API calls 106759->106761 106762 fb8d31 106760->106762 106763 f72d55 _free 58 API calls 106760->106763 106761->106760 106764 f72d55 _free 58 API calls 106762->106764 106765 fb8d43 106762->106765 106763->106762 106764->106765 106766 f5107d 106771 f5708b 106766->106771 106768 f5108c 106769 f72d40 __cinit 67 API calls 106768->106769 106770 f51096 106769->106770 106772 f5709b __ftell_nolock 106771->106772 106773 f57667 59 API calls 106772->106773 106774 f57151 106773->106774 106775 f54706 61 API calls 106774->106775 106776 f5715a 106775->106776 106802 f7050b 106776->106802 106779 f57cab 59 API calls 106780 f57173 106779->106780 106781 f53f74 59 API calls 106780->106781 106782 f57182 106781->106782 106783 f57667 59 API calls 106782->106783 106784 f5718b 106783->106784 106785 f57d8c 59 API calls 106784->106785 106786 f57194 RegOpenKeyExW 106785->106786 106787 f8e8b1 RegQueryValueExW 106786->106787 106791 f571b6 Mailbox 106786->106791 106788 f8e8ce 106787->106788 106789 f8e943 RegCloseKey 106787->106789 106790 f70db6 Mailbox 59 API calls 106788->106790 106789->106791 106801 f8e955 _wcscat Mailbox __wsetenvp 106789->106801 106792 f8e8e7 106790->106792 106791->106768 106793 f5522e 59 API calls 106792->106793 106794 f8e8f2 RegQueryValueExW 106793->106794 106795 f8e90f 106794->106795 106798 f8e929 106794->106798 106796 f57bcc 59 API calls 106795->106796 106796->106798 106797 f579f2 59 API calls 106797->106801 106798->106789 106799 f57de1 59 API calls 106799->106801 106800 f53f74 59 API calls 106800->106801 106801->106791 106801->106797 106801->106799 106801->106800 106803 f81940 __ftell_nolock 106802->106803 106804 f70518 GetFullPathNameW 106803->106804 106805 f7053a 106804->106805 106806 f57bcc 59 API calls 106805->106806 106807 f57165 106806->106807 106807->106779

              Control-flow Graph

              APIs
              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F53B68
              • IsDebuggerPresent.KERNEL32 ref: 00F53B7A
              • GetFullPathNameW.KERNEL32(00007FFF,?,?,010152F8,010152E0,?,?), ref: 00F53BEB
                • Part of subcall function 00F57BCC: _memmove.LIBCMT ref: 00F57C06
                • Part of subcall function 00F6092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00F53C14,010152F8,?,?,?), ref: 00F6096E
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F53C6F
              • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,01007770,00000010), ref: 00F8D281
              • SetCurrentDirectoryW.KERNEL32(?,010152F8,?,?,?), ref: 00F8D2B9
              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,01004260,010152F8,?,?,?), ref: 00F8D33F
              • ShellExecuteW.SHELL32(00000000,?,?), ref: 00F8D346
                • Part of subcall function 00F53A46: GetSysColorBrush.USER32(0000000F), ref: 00F53A50
                • Part of subcall function 00F53A46: LoadCursorW.USER32(00000000,00007F00), ref: 00F53A5F
                • Part of subcall function 00F53A46: LoadIconW.USER32(00000063), ref: 00F53A76
                • Part of subcall function 00F53A46: LoadIconW.USER32(000000A4), ref: 00F53A88
                • Part of subcall function 00F53A46: LoadIconW.USER32(000000A2), ref: 00F53A9A
                • Part of subcall function 00F53A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F53AC0
                • Part of subcall function 00F53A46: RegisterClassExW.USER32(?), ref: 00F53B16
                • Part of subcall function 00F539D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F53A03
                • Part of subcall function 00F539D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F53A24
                • Part of subcall function 00F539D5: ShowWindow.USER32(00000000,?,?), ref: 00F53A38
                • Part of subcall function 00F539D5: ShowWindow.USER32(00000000,?,?), ref: 00F53A41
                • Part of subcall function 00F5434A: _memset.LIBCMT ref: 00F54370
                • Part of subcall function 00F5434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F54415
              Strings
              • runas, xrefs: 00F8D33A
              • This is a third-party compiled AutoIt script., xrefs: 00F8D279
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
              • String ID: This is a third-party compiled AutoIt script.$runas
              • API String ID: 529118366-3287110873
              • Opcode ID: 7acbd86c4ebfde83e680772528dd7cb8ac4ba45f3198a9903972c51474b05fcb
              • Instruction ID: 0b44b80e8cb88c4eb56845cd6666646f792fe64b251be21ad1469d4ea13223ba
              • Opcode Fuzzy Hash: 7acbd86c4ebfde83e680772528dd7cb8ac4ba45f3198a9903972c51474b05fcb
              • Instruction Fuzzy Hash: 69511831D04208AADF11FBB8EC06EED7BB5AF86751F004059FD91AA191CA7D5609FB21

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 996 f549a0-f54a00 call f57667 GetVersionExW call f57bcc 1001 f54a06 996->1001 1002 f54b0b-f54b0d 996->1002 1004 f54a09-f54a0e 1001->1004 1003 f8d767-f8d773 1002->1003 1005 f8d774-f8d778 1003->1005 1006 f54a14 1004->1006 1007 f54b12-f54b13 1004->1007 1009 f8d77a 1005->1009 1010 f8d77b-f8d787 1005->1010 1008 f54a15-f54a4c call f57d2c call f57726 1006->1008 1007->1008 1018 f54a52-f54a53 1008->1018 1019 f8d864-f8d867 1008->1019 1009->1010 1010->1005 1012 f8d789-f8d78e 1010->1012 1012->1004 1014 f8d794-f8d79b 1012->1014 1014->1003 1016 f8d79d 1014->1016 1020 f8d7a2-f8d7a5 1016->1020 1018->1020 1021 f54a59-f54a64 1018->1021 1022 f8d869 1019->1022 1023 f8d880-f8d884 1019->1023 1024 f8d7ab-f8d7c9 1020->1024 1025 f54a93-f54aaa GetCurrentProcess IsWow64Process 1020->1025 1026 f8d7ea-f8d7f0 1021->1026 1027 f54a6a-f54a6c 1021->1027 1028 f8d86c 1022->1028 1030 f8d86f-f8d878 1023->1030 1031 f8d886-f8d88f 1023->1031 1024->1025 1029 f8d7cf-f8d7d5 1024->1029 1032 f54aac 1025->1032 1033 f54aaf-f54ac0 1025->1033 1038 f8d7fa-f8d800 1026->1038 1039 f8d7f2-f8d7f5 1026->1039 1034 f54a72-f54a75 1027->1034 1035 f8d805-f8d811 1027->1035 1028->1030 1036 f8d7df-f8d7e5 1029->1036 1037 f8d7d7-f8d7da 1029->1037 1030->1023 1031->1028 1040 f8d891-f8d894 1031->1040 1032->1033 1041 f54ac2-f54ad2 call f54b37 1033->1041 1042 f54b2b-f54b35 GetSystemInfo 1033->1042 1043 f8d831-f8d834 1034->1043 1044 f54a7b-f54a8a 1034->1044 1046 f8d81b-f8d821 1035->1046 1047 f8d813-f8d816 1035->1047 1036->1025 1037->1025 1038->1025 1039->1025 1040->1030 1053 f54ad4-f54ae1 call f54b37 1041->1053 1054 f54b1f-f54b29 GetSystemInfo 1041->1054 1045 f54af8-f54b08 1042->1045 1043->1025 1052 f8d83a-f8d84f 1043->1052 1049 f54a90 1044->1049 1050 f8d826-f8d82c 1044->1050 1046->1025 1047->1025 1049->1025 1050->1025 1055 f8d859-f8d85f 1052->1055 1056 f8d851-f8d854 1052->1056 1061 f54ae3-f54ae7 GetNativeSystemInfo 1053->1061 1062 f54b18-f54b1d 1053->1062 1057 f54ae9-f54aed 1054->1057 1055->1025 1056->1025 1057->1045 1059 f54aef-f54af2 FreeLibrary 1057->1059 1059->1045 1061->1057 1062->1061
              APIs
              • GetVersionExW.KERNEL32(?), ref: 00F549CD
                • Part of subcall function 00F57BCC: _memmove.LIBCMT ref: 00F57C06
              • GetCurrentProcess.KERNEL32(?,00FDFAEC,00000000,00000000,?), ref: 00F54A9A
              • IsWow64Process.KERNEL32(00000000), ref: 00F54AA1
              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00F54AE7
              • FreeLibrary.KERNEL32(00000000), ref: 00F54AF2
              • GetSystemInfo.KERNEL32(00000000), ref: 00F54B23
              • GetSystemInfo.KERNEL32(00000000), ref: 00F54B2F
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
              • String ID:
              • API String ID: 1986165174-0
              • Opcode ID: d097cbab0feea27c194070bb40031c06f2b2f52c16003c4e1e801135bc2921b7
              • Instruction ID: 855e0730d24499c5f9f43616fe3fde62eb3cc587a0eb8045afdccc17b1d79d81
              • Opcode Fuzzy Hash: d097cbab0feea27c194070bb40031c06f2b2f52c16003c4e1e801135bc2921b7
              • Instruction Fuzzy Hash: 6C91453188A7C0DEC731DB7884502AAFFF5AF2A315B0809AED5CB83A41D224B54CE719

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1063 f54e89-f54ea1 CreateStreamOnHGlobal 1064 f54ec1-f54ec6 1063->1064 1065 f54ea3-f54eba FindResourceExW 1063->1065 1066 f54ec0 1065->1066 1067 f8d933-f8d942 LoadResource 1065->1067 1066->1064 1067->1066 1068 f8d948-f8d956 SizeofResource 1067->1068 1068->1066 1069 f8d95c-f8d967 LockResource 1068->1069 1069->1066 1070 f8d96d-f8d98b 1069->1070 1070->1066
              APIs
              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00F54D8E,?,?,00000000,00000000), ref: 00F54E99
              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00F54D8E,?,?,00000000,00000000), ref: 00F54EB0
              • LoadResource.KERNEL32(?,00000000,?,?,00F54D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F54E2F), ref: 00F8D937
              • SizeofResource.KERNEL32(?,00000000,?,?,00F54D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F54E2F), ref: 00F8D94C
              • LockResource.KERNEL32(00F54D8E,?,?,00F54D8E,?,?,00000000,00000000,?,?,?,?,?,?,00F54E2F,00000000), ref: 00F8D95F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
              • String ID: SCRIPT
              • API String ID: 3051347437-3967369404
              • Opcode ID: 3a27d693c83692e5b2bd91dcbbad62045117806cf0e2f876c35d1a041c93cc80
              • Instruction ID: c1d7fc59af28bd84287de0257aac6d86a185ccf5e222fbd994767148c65b4a14
              • Opcode Fuzzy Hash: 3a27d693c83692e5b2bd91dcbbad62045117806cf0e2f876c35d1a041c93cc80
              • Instruction Fuzzy Hash: C2119E71600304BFD7218B65EC49F677BBAFFC5B12F14426DF90686250DB61E848AA60
              APIs
              • GetFileAttributesW.KERNELBASE(?,00F8E398), ref: 00FB446A
              • FindFirstFileW.KERNELBASE(?,?), ref: 00FB447B
              • FindClose.KERNEL32(00000000), ref: 00FB448B
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: FileFind$AttributesCloseFirst
              • String ID:
              • API String ID: 48322524-0
              • Opcode ID: 463af34bd3ffe7952905475ef08dc50146ac586072c6d4fe700217d63db21d10
              • Instruction ID: 8dc936b50ea4f3870a15262f55c8e37d8e97cc949db186299f128523b6576b4c
              • Opcode Fuzzy Hash: 463af34bd3ffe7952905475ef08dc50146ac586072c6d4fe700217d63db21d10
              • Instruction Fuzzy Hash: 81E0D833811504AB4210AB38EC0D8E9775D9E05335F100716FC36C10D0E7746914B995
              APIs
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F60A5B
              • timeGetTime.WINMM ref: 00F60D16
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F60E53
              • Sleep.KERNEL32(0000000A), ref: 00F60E61
              • LockWindowUpdate.USER32(00000000,?,?), ref: 00F60EFA
              • DestroyWindow.USER32 ref: 00F60F06
              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00F60F20
              • Sleep.KERNEL32(0000000A,?,?), ref: 00F94E83
              • TranslateMessage.USER32(?), ref: 00F95C60
              • DispatchMessageW.USER32(?), ref: 00F95C6E
              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00F95C82
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
              • API String ID: 4212290369-3242690629
              • Opcode ID: 43d8ea941fd7c0b9d686d445ddde87e8f4b0907063e5b6f8145670a6bd363b82
              • Instruction ID: 534ec5ed2acc0f765cc6765d8ce6a4297428d75d9b26318fe63ce2f3590a9dc4
              • Opcode Fuzzy Hash: 43d8ea941fd7c0b9d686d445ddde87e8f4b0907063e5b6f8145670a6bd363b82
              • Instruction Fuzzy Hash: 54B20470608741DFEB25DF24C884BABB7E1BF85714F14491DF98A87291CB79E848EB42

              Control-flow Graph

              APIs
                • Part of subcall function 00FB8F5F: __time64.LIBCMT ref: 00FB8F69
                • Part of subcall function 00F54EE5: _fseek.LIBCMT ref: 00F54EFD
              • __wsplitpath.LIBCMT ref: 00FB9234
                • Part of subcall function 00F740FB: __wsplitpath_helper.LIBCMT ref: 00F7413B
              • _wcscpy.LIBCMT ref: 00FB9247
              • _wcscat.LIBCMT ref: 00FB925A
              • __wsplitpath.LIBCMT ref: 00FB927F
              • _wcscat.LIBCMT ref: 00FB9295
              • _wcscat.LIBCMT ref: 00FB92A8
                • Part of subcall function 00FB8FA5: _memmove.LIBCMT ref: 00FB8FDE
                • Part of subcall function 00FB8FA5: _memmove.LIBCMT ref: 00FB8FED
              • _wcscmp.LIBCMT ref: 00FB91EF
                • Part of subcall function 00FB9734: _wcscmp.LIBCMT ref: 00FB9824
                • Part of subcall function 00FB9734: _wcscmp.LIBCMT ref: 00FB9837
              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00FB9452
              • _wcsncpy.LIBCMT ref: 00FB94C5
              • DeleteFileW.KERNEL32(?,?), ref: 00FB94FB
              • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00FB9511
              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FB9522
              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00FB9534
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
              • String ID:
              • API String ID: 1500180987-0
              • Opcode ID: 638970da29d3e8ee39d8f977b3356e1602fcee057b934d88c3b87b7fea1c5f9b
              • Instruction ID: 52c9a05988e1bc6bd82359661af2c01b5a3742f04ab1b9156f7055a9a5f378c4
              • Opcode Fuzzy Hash: 638970da29d3e8ee39d8f977b3356e1602fcee057b934d88c3b87b7fea1c5f9b
              • Instruction Fuzzy Hash: B4C15BB1D04219AADF21DFA5CC85EDEBBBDEF45310F0040AAF609E7141DB749A84AF61

              Control-flow Graph

              APIs
              • GetSysColorBrush.USER32(0000000F), ref: 00F53074
              • RegisterClassExW.USER32(00000030), ref: 00F5309E
              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F530AF
              • InitCommonControlsEx.COMCTL32(?), ref: 00F530CC
              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F530DC
              • LoadIconW.USER32(000000A9), ref: 00F530F2
              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F53101
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
              • API String ID: 2914291525-1005189915
              • Opcode ID: 6430a8b82c634b666cb9f4b0625ac100ced0e1ff365243d7109c224ff0142a38
              • Instruction ID: 6d7fe182301ceff008b5f002e306b96007c19977bf04bdd45d04f7476e699b74
              • Opcode Fuzzy Hash: 6430a8b82c634b666cb9f4b0625ac100ced0e1ff365243d7109c224ff0142a38
              • Instruction Fuzzy Hash: A9314971941349AFDB11CFA4DC89ACDBBF1FB0A310F14456EE981EA290D3BA0589DF51

              Control-flow Graph

              APIs
              • GetSysColorBrush.USER32(0000000F), ref: 00F53074
              • RegisterClassExW.USER32(00000030), ref: 00F5309E
              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F530AF
              • InitCommonControlsEx.COMCTL32(?), ref: 00F530CC
              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F530DC
              • LoadIconW.USER32(000000A9), ref: 00F530F2
              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F53101
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
              • API String ID: 2914291525-1005189915
              • Opcode ID: 2f1c0fe017e02e063e429188af91b66e53c43ae213667f858b05082439e18136
              • Instruction ID: 3596bc2d857597ba6936cc33ea3be6dbce89f97366dd63785123d8ac5414c9a7
              • Opcode Fuzzy Hash: 2f1c0fe017e02e063e429188af91b66e53c43ae213667f858b05082439e18136
              • Instruction Fuzzy Hash: 1821F7B1D11208AFDB10DFA4EC48BDDBBF5FB09700F04812AF951AA290D7BA45489F91

              Control-flow Graph

              APIs
                • Part of subcall function 00F54706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,010152F8,?,00F537AE,?), ref: 00F54724
                • Part of subcall function 00F7050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00F57165), ref: 00F7052D
              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00F571A8
              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00F8E8C8
              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00F8E909
              • RegCloseKey.ADVAPI32(?), ref: 00F8E947
              • _wcscat.LIBCMT ref: 00F8E9A0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
              • API String ID: 2673923337-2727554177
              • Opcode ID: be7f85b68084c9774e8a23aec333a44f4565065e404774dfe7473b4a5f502731
              • Instruction ID: e5139547c720775450c7b486539b17c201d8261d190af0c342b8a32d00035cf6
              • Opcode Fuzzy Hash: be7f85b68084c9774e8a23aec333a44f4565065e404774dfe7473b4a5f502731
              • Instruction Fuzzy Hash: 67719F715097019EC314EF65EC419AFBBE8FF84350F40452EF985872A0DBBE9948EB52

              Control-flow Graph

              APIs
              • GetSysColorBrush.USER32(0000000F), ref: 00F53A50
              • LoadCursorW.USER32(00000000,00007F00), ref: 00F53A5F
              • LoadIconW.USER32(00000063), ref: 00F53A76
              • LoadIconW.USER32(000000A4), ref: 00F53A88
              • LoadIconW.USER32(000000A2), ref: 00F53A9A
              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00F53AC0
              • RegisterClassExW.USER32(?), ref: 00F53B16
                • Part of subcall function 00F53041: GetSysColorBrush.USER32(0000000F), ref: 00F53074
                • Part of subcall function 00F53041: RegisterClassExW.USER32(00000030), ref: 00F5309E
                • Part of subcall function 00F53041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F530AF
                • Part of subcall function 00F53041: InitCommonControlsEx.COMCTL32(?), ref: 00F530CC
                • Part of subcall function 00F53041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00F530DC
                • Part of subcall function 00F53041: LoadIconW.USER32(000000A9), ref: 00F530F2
                • Part of subcall function 00F53041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00F53101
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
              • String ID: #$0$AutoIt v3
              • API String ID: 423443420-4155596026
              • Opcode ID: aa329875c07c7782b8844f75b86a63da974fafe25178ef8c1505bbb468994840
              • Instruction ID: 358d360e2e0821689e2ff38e2ee7c93c4ac0fff74c93ac0a08abc1db6fd4e8bf
              • Opcode Fuzzy Hash: aa329875c07c7782b8844f75b86a63da974fafe25178ef8c1505bbb468994840
              • Instruction Fuzzy Hash: 05215C72D01308AFEB20DFA4EC09BDD7BB1FB4A711F00012AF640AA295D3BE56449F94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 767 f53633-f53681 769 f536e1-f536e3 767->769 770 f53683-f53686 767->770 769->770 771 f536e5 769->771 772 f536e7 770->772 773 f53688-f5368f 770->773 774 f536ca-f536d2 DefWindowProcW 771->774 775 f8d0cc-f8d0fa call f61070 call f61093 772->775 776 f536ed-f536f0 772->776 777 f53695-f5369a 773->777 778 f5374b-f53753 PostQuitMessage 773->778 780 f536d8-f536de 774->780 810 f8d0ff-f8d106 775->810 781 f53715-f5373c SetTimer RegisterWindowMessageW 776->781 782 f536f2-f536f3 776->782 784 f536a0-f536a2 777->784 785 f8d154-f8d168 call fb2527 777->785 779 f53711-f53713 778->779 779->780 781->779 790 f5373e-f53749 CreatePopupMenu 781->790 787 f8d06f-f8d072 782->787 788 f536f9-f5370c KillTimer call f5443a call f53114 782->788 791 f53755-f53764 call f544a0 784->791 792 f536a8-f536ad 784->792 785->779 804 f8d16e 785->804 797 f8d0a8-f8d0c7 MoveWindow 787->797 798 f8d074-f8d076 787->798 788->779 790->779 791->779 793 f8d139-f8d140 792->793 794 f536b3-f536b8 792->794 793->774 809 f8d146-f8d14f call fa7c36 793->809 802 f536be-f536c4 794->802 803 f8d124-f8d134 call fb2d36 794->803 797->779 806 f8d078-f8d07b 798->806 807 f8d097-f8d0a3 SetFocus 798->807 802->774 802->810 803->779 804->774 806->802 811 f8d081-f8d092 call f61070 806->811 807->779 809->774 810->774 815 f8d10c-f8d11f call f5443a call f5434a 810->815 811->779 815->774
              APIs
              • DefWindowProcW.USER32(?,?,?,?), ref: 00F536D2
              • KillTimer.USER32(?,00000001), ref: 00F536FC
              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F5371F
              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00F5372A
              • CreatePopupMenu.USER32 ref: 00F5373E
              • PostQuitMessage.USER32(00000000), ref: 00F5374D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
              • String ID: TaskbarCreated
              • API String ID: 129472671-2362178303
              • Opcode ID: b4186efe93e02455929850da99aa6ebeb9f63f588f2a23f4b88c4ca57a7cb6b0
              • Instruction ID: b95046f6fca4b50db916ab4ad23bc4c216168ce3c0a277b8ad5567a6de4d9ec8
              • Opcode Fuzzy Hash: b4186efe93e02455929850da99aa6ebeb9f63f588f2a23f4b88c4ca57a7cb6b0
              • Instruction Fuzzy Hash: F8415AB3A04109BBDB206F3CEC09FB93755EB46352F140129FF429A295CA6D994DB721

              Control-flow Graph

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
              • API String ID: 1825951767-3513169116
              • Opcode ID: 90e64a61116445e2d6f151a74664ffd5750a62998b36a56fd89368ca74d754aa
              • Instruction ID: f19e4d805f55e9c0b2568893ba4feeb19dc86935e154916cdbe5ed82e71d59b3
              • Opcode Fuzzy Hash: 90e64a61116445e2d6f151a74664ffd5750a62998b36a56fd89368ca74d754aa
              • Instruction Fuzzy Hash: D8A19E72D0021D9ACB04EBA4DC52EEEB779BF15351F44041AFA06B7191DF789A0DEB60

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 942 1206390-120643e call 1203db0 945 1206445-120646b call 12072a0 CreateFileW 942->945 948 1206472-1206482 945->948 949 120646d 945->949 954 1206484 948->954 955 1206489-12064a3 VirtualAlloc 948->955 950 12065bd-12065c1 949->950 952 1206603-1206606 950->952 953 12065c3-12065c7 950->953 956 1206609-1206610 952->956 957 12065d3-12065d7 953->957 958 12065c9-12065cc 953->958 954->950 961 12064a5 955->961 962 12064aa-12064c1 ReadFile 955->962 963 1206612-120661d 956->963 964 1206665-120667a 956->964 959 12065e7-12065eb 957->959 960 12065d9-12065e3 957->960 958->957 967 12065fb 959->967 968 12065ed-12065f7 959->968 960->959 961->950 969 12064c3 962->969 970 12064c8-1206508 VirtualAlloc 962->970 971 1206621-120662d 963->971 972 120661f 963->972 965 120668a-1206692 964->965 966 120667c-1206687 VirtualFree 964->966 966->965 967->952 968->967 969->950 973 120650a 970->973 974 120650f-120652a call 12074f0 970->974 975 1206641-120664d 971->975 976 120662f-120663f 971->976 972->964 973->950 982 1206535-120653f 974->982 977 120665a-1206660 975->977 978 120664f-1206658 975->978 980 1206663 976->980 977->980 978->980 980->956 983 1206541-1206570 call 12074f0 982->983 984 1206572-1206586 call 1207300 982->984 983->982 990 1206588 984->990 991 120658a-120658e 984->991 990->950 992 1206590-1206594 CloseHandle 991->992 993 120659a-120659e 991->993 992->993 994 12065a0-12065ab VirtualFree 993->994 995 12065ae-12065b7 993->995 994->995 995->945 995->950
              APIs
              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01206461
              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01206687
              Memory Dump Source
              • Source File: 00000000.00000002.1345424818.0000000001203000.00000040.00000020.00020000.00000000.sdmp, Offset: 01203000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1203000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CreateFileFreeVirtual
              • String ID:
              • API String ID: 204039940-0
              • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
              • Instruction ID: f70e35bef226477c0682055bf71376c4503ac3747553cfc4264172282a9adb93
              • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
              • Instruction Fuzzy Hash: CAA1F770E10209EFDB15CFA4D895BAEBBB5FF48304F208259E601BB2C2D7759A91CB54

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1073 f539d5-f53a45 CreateWindowExW * 2 ShowWindow * 2
              APIs
              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00F53A03
              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00F53A24
              • ShowWindow.USER32(00000000,?,?), ref: 00F53A38
              • ShowWindow.USER32(00000000,?,?), ref: 00F53A41
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$CreateShow
              • String ID: AutoIt v3$edit
              • API String ID: 1584632944-3779509399
              • Opcode ID: ea19158627a784f904b4746016afde264865441e760e2f3f2e590cacb92070c3
              • Instruction ID: 8f39086d08674da7ebcf48bce39ab98128eebe0cb00fc01b71df109bbc696353
              • Opcode Fuzzy Hash: ea19158627a784f904b4746016afde264865441e760e2f3f2e590cacb92070c3
              • Instruction Fuzzy Hash: 4BF030725012947EEA305623AC08EA73E7ED7C7F50B00002AF901A7164C16E0801DB70

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1074 1206160-1206288 call 1203db0 call 1206050 CreateFileW 1081 120628a 1074->1081 1082 120628f-120629f 1074->1082 1083 120633f-1206344 1081->1083 1085 12062a1 1082->1085 1086 12062a6-12062c0 VirtualAlloc 1082->1086 1085->1083 1087 12062c2 1086->1087 1088 12062c4-12062db ReadFile 1086->1088 1087->1083 1089 12062dd 1088->1089 1090 12062df-1206319 call 1206090 call 1205050 1088->1090 1089->1083 1095 1206335-120633d ExitProcess 1090->1095 1096 120631b-1206330 call 12060e0 1090->1096 1095->1083 1096->1095
              APIs
                • Part of subcall function 01206050: Sleep.KERNELBASE(000001F4), ref: 01206061
              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0120627E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1345424818.0000000001203000.00000040.00000020.00020000.00000000.sdmp, Offset: 01203000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1203000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CreateFileSleep
              • String ID: LRNW07TSUYMDTULQ2CEAMZ
              • API String ID: 2694422964-3731089094
              • Opcode ID: 71680c4ce16f250b7a50941d0dcdb05bdc690e2763ef4194049b1cc3a20a88af
              • Instruction ID: 2ce6de7dddc9b37648bcf1d6980ae712377d3a510409bdb8ef0440b15c30e061
              • Opcode Fuzzy Hash: 71680c4ce16f250b7a50941d0dcdb05bdc690e2763ef4194049b1cc3a20a88af
              • Instruction Fuzzy Hash: 2551B470D14289DAEF12DBE4C859BEFBBB5AF14304F044199E6087B2C1C7B90B44CBA5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1098 f5407c-f54092 1099 f5416f-f54173 1098->1099 1100 f54098-f540ad call f57a16 1098->1100 1103 f8d3c8-f8d3d7 LoadStringW 1100->1103 1104 f540b3-f540d3 call f57bcc 1100->1104 1107 f8d3e2-f8d3fa call f57b2e call f56fe3 1103->1107 1104->1107 1108 f540d9-f540dd 1104->1108 1118 f540ed-f5416a call f72de0 call f5454e call f72dbc Shell_NotifyIconW call f55904 1107->1118 1120 f8d400-f8d41e call f57cab call f56fe3 call f57cab 1107->1120 1110 f54174-f5417d call f58047 1108->1110 1111 f540e3-f540e8 call f57b2e 1108->1111 1110->1118 1111->1118 1118->1099 1120->1118
              APIs
              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00F8D3D7
                • Part of subcall function 00F57BCC: _memmove.LIBCMT ref: 00F57C06
              • _memset.LIBCMT ref: 00F540FC
              • _wcscpy.LIBCMT ref: 00F54150
              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F54160
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
              • String ID: Line:
              • API String ID: 3942752672-1585850449
              • Opcode ID: 04c9ba69b6a69996713669b8589e5cd9547f1632b16c94cd84f9774095ef986f
              • Instruction ID: 26c03f7376456704962bb66f53b46392d5695f56c759cde2b42d4363d886425f
              • Opcode Fuzzy Hash: 04c9ba69b6a69996713669b8589e5cd9547f1632b16c94cd84f9774095ef986f
              • Instruction Fuzzy Hash: 9A31BE72408304ABD331EB60EC46FDB77E8AF85315F20451EFA8596091EB7CA64CE782

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1133 f5686a-f56891 call f54ddd 1136 f56897-f568a5 call f54ddd 1133->1136 1137 f8e031-f8e041 call fb955b 1133->1137 1136->1137 1142 f568ab-f568b1 1136->1142 1140 f8e046-f8e048 1137->1140 1143 f8e04a-f8e04d call f54e4a 1140->1143 1144 f8e067-f8e0af call f70db6 1140->1144 1145 f568b7-f568d9 call f56a8c 1142->1145 1146 f8e052-f8e061 call fb42f8 1142->1146 1143->1146 1152 f8e0b1-f8e0bb 1144->1152 1153 f8e0d4 1144->1153 1146->1144 1156 f8e0cf-f8e0d0 1152->1156 1157 f8e0d6-f8e0e9 1153->1157 1158 f8e0bd-f8e0cc 1156->1158 1159 f8e0d2 1156->1159 1160 f8e0ef 1157->1160 1161 f8e260-f8e263 call f72d55 1157->1161 1158->1156 1159->1157 1163 f8e0f6-f8e0f9 call f57480 1160->1163 1164 f8e268-f8e271 call f54e4a 1161->1164 1167 f8e0fe-f8e120 call f55db2 call fb73e9 1163->1167 1170 f8e273-f8e283 call f57616 call f55d9b 1164->1170 1177 f8e122-f8e12f 1167->1177 1178 f8e134-f8e13e call fb73d3 1167->1178 1186 f8e288-f8e2b8 call faf7a1 call f70e2c call f72d55 call f54e4a 1170->1186 1181 f8e227-f8e237 call f5750f 1177->1181 1184 f8e158-f8e162 call fb73bd 1178->1184 1185 f8e140-f8e153 1178->1185 1181->1167 1190 f8e23d-f8e25a call f5735d 1181->1190 1195 f8e164-f8e171 1184->1195 1196 f8e176-f8e180 call f55e2a 1184->1196 1185->1181 1186->1170 1190->1161 1190->1163 1195->1181 1196->1181 1203 f8e186-f8e19e call faf73d 1196->1203 1208 f8e1a0-f8e1bf call f57de1 call f55904 1203->1208 1209 f8e1c1-f8e1c4 1203->1209 1232 f8e1e2-f8e1f0 call f55db2 1208->1232 1210 f8e1f2-f8e1f5 1209->1210 1211 f8e1c6-f8e1e1 call f57de1 call f56839 call f55904 1209->1211 1213 f8e215-f8e218 call fb737f 1210->1213 1214 f8e1f7-f8e200 call faf65e 1210->1214 1211->1232 1222 f8e21d-f8e226 call f70e2c 1213->1222 1214->1186 1225 f8e206-f8e210 call f70e2c 1214->1225 1222->1181 1225->1167 1232->1222
              APIs
                • Part of subcall function 00F54DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,010152F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F54E0F
              • _free.LIBCMT ref: 00F8E263
              • _free.LIBCMT ref: 00F8E2AA
                • Part of subcall function 00F56A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00F56BAD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _free$CurrentDirectoryLibraryLoad
              • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
              • API String ID: 2861923089-1757145024
              • Opcode ID: 7a4357d584aa0efbf7311c2c19936bc254dd72f0616597436be6f5159aafc9ee
              • Instruction ID: 3d76675a4a8501052086abe4cf4c663c6bdd881fb41ac45bfef694f35944dfba
              • Opcode Fuzzy Hash: 7a4357d584aa0efbf7311c2c19936bc254dd72f0616597436be6f5159aafc9ee
              • Instruction Fuzzy Hash: 78917D71D04219EFCF04EFA4CC919EDB7B8FF05311B14442AF916AB2A1DB78A949EB50
              APIs
              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00F535A1,SwapMouseButtons,00000004,?), ref: 00F535D4
              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00F535A1,SwapMouseButtons,00000004,?,?,?,?,00F52754), ref: 00F535F5
              • RegCloseKey.KERNELBASE(00000000,?,?,00F535A1,SwapMouseButtons,00000004,?,?,?,?,00F52754), ref: 00F53617
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CloseOpenQueryValue
              • String ID: Control Panel\Mouse
              • API String ID: 3677997916-824357125
              • Opcode ID: 021d0c17ddf178fc4009540550c6601897e191ff72f58fb9a6121f7bd7d83623
              • Instruction ID: 8d1a7077d0d2d7656ffc98a441214e54905282dc3ced6a7244c512b960ddd7de
              • Opcode Fuzzy Hash: 021d0c17ddf178fc4009540550c6601897e191ff72f58fb9a6121f7bd7d83623
              • Instruction Fuzzy Hash: 2D115A71911208BFDB208F68DC44EAEBBB9EF04791F00846AF905D7210D2719F58A760
              APIs
              • CreateProcessW.KERNELBASE(?,00000000), ref: 0120580B
              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 012058A1
              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 012058C3
              Memory Dump Source
              • Source File: 00000000.00000002.1345424818.0000000001203000.00000040.00000020.00020000.00000000.sdmp, Offset: 01203000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1203000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Process$ContextCreateMemoryReadThreadWow64
              • String ID:
              • API String ID: 2438371351-0
              • Opcode ID: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
              • Instruction ID: f88bcfbfe6850911d8e4f6d10fd0bfbeca5a06d31a650ff816f03e7c33aff8f1
              • Opcode Fuzzy Hash: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
              • Instruction Fuzzy Hash: 91621C30A246589BEB24CFA4C841BDEB772EF58300F1091A9D20DEB2D5E7759E81CF59
              APIs
                • Part of subcall function 00F54EE5: _fseek.LIBCMT ref: 00F54EFD
                • Part of subcall function 00FB9734: _wcscmp.LIBCMT ref: 00FB9824
                • Part of subcall function 00FB9734: _wcscmp.LIBCMT ref: 00FB9837
              • _free.LIBCMT ref: 00FB96A2
              • _free.LIBCMT ref: 00FB96A9
              • _free.LIBCMT ref: 00FB9714
                • Part of subcall function 00F72D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00F79A24), ref: 00F72D69
                • Part of subcall function 00F72D55: GetLastError.KERNEL32(00000000,?,00F79A24), ref: 00F72D7B
              • _free.LIBCMT ref: 00FB971C
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
              • String ID:
              • API String ID: 1552873950-0
              • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
              • Instruction ID: d7305a993f5c4801b60f8ab7ddc52d9654a9ebf5fc170b6f7fc0969a89e5622c
              • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
              • Instruction Fuzzy Hash: CE517BB1D04218ABDF249F65CC85AEEBBB9EF48300F10409EF60DA3241DB755A81DF59
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
              • String ID:
              • API String ID: 2782032738-0
              • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
              • Instruction ID: 4073a32892797cea358444c272ced6da8262cb6a57054147630ad1fb5cc4153f
              • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
              • Instruction Fuzzy Hash: AF41B675E007499BDB1C8E69C8809AE77A5AF46360B24C13FE81DC7640D774ED41AB43
              APIs
              • _memset.LIBCMT ref: 00F8EA39
              • GetOpenFileNameW.COMDLG32(?), ref: 00F8EA83
                • Part of subcall function 00F54750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F54743,?,?,00F537AE,?), ref: 00F54770
                • Part of subcall function 00F70791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00F707B0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Name$Path$FileFullLongOpen_memset
              • String ID: X
              • API String ID: 3777226403-3081909835
              • Opcode ID: 74727920963f3e3ad96b7427bea8929a087271c2cac15490db6ecf0de2d20ed1
              • Instruction ID: 59531ad8869c3c3fbd4f977db1120f9530d00bda56241ea37e7fa4f9ad79667a
              • Opcode Fuzzy Hash: 74727920963f3e3ad96b7427bea8929a087271c2cac15490db6ecf0de2d20ed1
              • Instruction Fuzzy Hash: 7E21F631E002489BDB05AF94DC45BDE7BFCAF49711F00805AE948E7281DBB8598D9FA1
              APIs
              • GetTempPathW.KERNEL32(00000104,?), ref: 00FB98F8
              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00FB990F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Temp$FileNamePath
              • String ID: aut
              • API String ID: 3285503233-3010740371
              • Opcode ID: d2b51abeed56b8f8ddf817513ee8d4953a519b9379e16acefb1eccc53fc39605
              • Instruction ID: 61c7d0ec5f15f088fbbe781494702a7bd3880271b59be767951bdf3de072498f
              • Opcode Fuzzy Hash: d2b51abeed56b8f8ddf817513ee8d4953a519b9379e16acefb1eccc53fc39605
              • Instruction Fuzzy Hash: DBD05E7994130DABDB509BA0EC0EF9A773CE704701F0042B2BA95951A1EAB096989B95
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0a516a2992d18ee43cec57288055849cc4bf67bebb101b447bf332c7f0169f53
              • Instruction ID: 90e0733686c92f042846067da4035d4c5785b0974e92df7c95f2690ce828ad34
              • Opcode Fuzzy Hash: 0a516a2992d18ee43cec57288055849cc4bf67bebb101b447bf332c7f0169f53
              • Instruction Fuzzy Hash: 63F16A71A083019FC714DF28C981A6ABBE5FF88314F14892EF8999B351D734E905DF82
              APIs
                • Part of subcall function 00F70162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F70193
                • Part of subcall function 00F70162: MapVirtualKeyW.USER32(00000010,00000000), ref: 00F7019B
                • Part of subcall function 00F70162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F701A6
                • Part of subcall function 00F70162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F701B1
                • Part of subcall function 00F70162: MapVirtualKeyW.USER32(00000011,00000000), ref: 00F701B9
                • Part of subcall function 00F70162: MapVirtualKeyW.USER32(00000012,00000000), ref: 00F701C1
                • Part of subcall function 00F660F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00F5F930), ref: 00F66154
              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00F5F9CD
              • OleInitialize.OLE32(00000000), ref: 00F5FA4A
              • CloseHandle.KERNEL32(00000000), ref: 00F945C8
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
              • String ID:
              • API String ID: 1986988660-0
              • Opcode ID: 8f5806ee27feec338d02f068ddb874b7ebe53aa35fba58254dc2ed2e49974317
              • Instruction ID: 6d670672ccf92797686a3b70655b08252f67a75ed345004e44161d03d495e544
              • Opcode Fuzzy Hash: 8f5806ee27feec338d02f068ddb874b7ebe53aa35fba58254dc2ed2e49974317
              • Instruction Fuzzy Hash: B281CDB0A81240CF83A4DF79FC456597BE5FBDA30AB50812AA089CF25AEB7E40049F15
              APIs
              • _memset.LIBCMT ref: 00F54370
              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00F54415
              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00F54432
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: IconNotifyShell_$_memset
              • String ID:
              • API String ID: 1505330794-0
              • Opcode ID: 9124cf5f8db41d278265c67473df4e14db8663368baa88562a0b5bf37f95095c
              • Instruction ID: 1421b60e337cd19d14684b6fb86517adb22c20ea9176a853b7323db861b4c8a2
              • Opcode Fuzzy Hash: 9124cf5f8db41d278265c67473df4e14db8663368baa88562a0b5bf37f95095c
              • Instruction Fuzzy Hash: C331B4719053018FC720DF34D88469BBBF8FB49319F00092EFACA87241D779A988DB52
              APIs
              • __FF_MSGBANNER.LIBCMT ref: 00F75733
                • Part of subcall function 00F7A16B: __NMSG_WRITE.LIBCMT ref: 00F7A192
                • Part of subcall function 00F7A16B: __NMSG_WRITE.LIBCMT ref: 00F7A19C
              • __NMSG_WRITE.LIBCMT ref: 00F7573A
                • Part of subcall function 00F7A1C8: GetModuleFileNameW.KERNEL32(00000000,010133BA,00000104,?,00000001,00000000), ref: 00F7A25A
                • Part of subcall function 00F7A1C8: ___crtMessageBoxW.LIBCMT ref: 00F7A308
                • Part of subcall function 00F7309F: ___crtCorExitProcess.LIBCMT ref: 00F730A5
                • Part of subcall function 00F7309F: ExitProcess.KERNEL32 ref: 00F730AE
                • Part of subcall function 00F78B28: __getptd_noexit.LIBCMT ref: 00F78B28
              • RtlAllocateHeap.NTDLL(01160000,00000000,00000001,00000000,?,?,?,00F70DD3,?), ref: 00F7575F
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
              • String ID:
              • API String ID: 1372826849-0
              • Opcode ID: 5593b51ca4fd5e3780ac78f917311b960a3e7640af02dc12b9ddd015d1e8e8a5
              • Instruction ID: 27e3de5f98ed97cfe3274191988d56d0532295f1f52083189959c589d845d0b7
              • Opcode Fuzzy Hash: 5593b51ca4fd5e3780ac78f917311b960a3e7640af02dc12b9ddd015d1e8e8a5
              • Instruction Fuzzy Hash: 5B01D631640A0ADAE6282678AC42B6D77489B81B71F108027F40DEA181DEF89C027763
              APIs
              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00FB9548,?,?,?,?,?,00000004), ref: 00FB98BB
              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00FB9548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00FB98D1
              • CloseHandle.KERNEL32(00000000,?,00FB9548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00FB98D8
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: File$CloseCreateHandleTime
              • String ID:
              • API String ID: 3397143404-0
              • Opcode ID: 3c3d8de335910551d0dcbfcc790fcf297928805d78688efdbcb8735843655715
              • Instruction ID: 36036a31d33bd88dfdc72c19ef5e07725a5ea19d7c4c2be0712335f0784f387c
              • Opcode Fuzzy Hash: 3c3d8de335910551d0dcbfcc790fcf297928805d78688efdbcb8735843655715
              • Instruction Fuzzy Hash: D4E08632241228B7D7211B64EC09FCA7F1AAF06770F104221FB15690E087B15615A798
              APIs
              • _free.LIBCMT ref: 00FB8D1B
                • Part of subcall function 00F72D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00F79A24), ref: 00F72D69
                • Part of subcall function 00F72D55: GetLastError.KERNEL32(00000000,?,00F79A24), ref: 00F72D7B
              • _free.LIBCMT ref: 00FB8D2C
              • _free.LIBCMT ref: 00FB8D3E
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
              • Instruction ID: 95e459651bb983a6e1e99d8bd4cb66ddaf9579521b1923cc43b37daa875b1928
              • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
              • Instruction Fuzzy Hash: A3E012A1A0160146CB74A57AAD40AD363DC4F9C3A2714491FB80DD7186CE68F843E524
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID:
              • String ID: CALL
              • API String ID: 0-4196123274
              • Opcode ID: 59b7861f596b93717ae58049803cfa61b1e376dae7cbf87449f839a2be719724
              • Instruction ID: 5e9ab927e83843f9f5b6dd0ce543ed6d79dfdd505d7d9a09726188db4c092745
              • Opcode Fuzzy Hash: 59b7861f596b93717ae58049803cfa61b1e376dae7cbf87449f839a2be719724
              • Instruction Fuzzy Hash: 9A228C71908301DFCB24DF14C854B6ABBE1BF85311F14895DE98A8B361DB35EC59EB82
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _memmove
              • String ID: EA06
              • API String ID: 4104443479-3962188686
              • Opcode ID: 410c4e28639858795908414a39cb890e4677be1996bf02d7ef1a44d3ad431054
              • Instruction ID: eab94ec7f98d2018395e9effd343be98528b348d73b2a1facaf23091aeb9dd6b
              • Opcode Fuzzy Hash: 410c4e28639858795908414a39cb890e4677be1996bf02d7ef1a44d3ad431054
              • Instruction Fuzzy Hash: 3E417D22E0415857CF219B548C567BE7FB19F4531AF284075EF82DB282D6287DCDB3A1
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _memmove
              • String ID:
              • API String ID: 4104443479-0
              • Opcode ID: 40fbce4a1fea4cfe3bf1a015a5a2827c9472d34ae18aa590b79f6fb0e3b65f37
              • Instruction ID: fb0a233aa39479a9bc680d5287ec3e276cc2adf90e05ef11c06a66e827dcb32a
              • Opcode Fuzzy Hash: 40fbce4a1fea4cfe3bf1a015a5a2827c9472d34ae18aa590b79f6fb0e3b65f37
              • Instruction Fuzzy Hash: 6B31C7B2604606AFC704EF68D8D1E69B3A9FF483207148629F919CB291EB34E914DB90
              APIs
              • IsThemeActive.UXTHEME ref: 00F54834
                • Part of subcall function 00F7336C: __lock.LIBCMT ref: 00F73372
                • Part of subcall function 00F7336C: DecodePointer.KERNEL32(00000001,?,00F54849,00FA7C74), ref: 00F7337E
                • Part of subcall function 00F7336C: EncodePointer.KERNEL32(?,?,00F54849,00FA7C74), ref: 00F73389
                • Part of subcall function 00F548FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00F54915
                • Part of subcall function 00F548FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F5492A
                • Part of subcall function 00F53B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F53B68
                • Part of subcall function 00F53B3A: IsDebuggerPresent.KERNEL32 ref: 00F53B7A
                • Part of subcall function 00F53B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,010152F8,010152E0,?,?), ref: 00F53BEB
                • Part of subcall function 00F53B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00F53C6F
              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00F54874
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
              • String ID:
              • API String ID: 1438897964-0
              • Opcode ID: d44785ee26c18b8cbab86ffe80c8e0e2ccd688c51cce34af11cea8be8a8ce0a5
              • Instruction ID: db53fb4d422a4bd09cad887e1831df60fcafc72ec71d1621270b66c2bbaf8c79
              • Opcode Fuzzy Hash: d44785ee26c18b8cbab86ffe80c8e0e2ccd688c51cce34af11cea8be8a8ce0a5
              • Instruction Fuzzy Hash: 1911D2729083019FC710DF68EC0594ABFE8EF9A751F00451FF584872A1DBB99548DB82
              APIs
                • Part of subcall function 00F7571C: __FF_MSGBANNER.LIBCMT ref: 00F75733
                • Part of subcall function 00F7571C: __NMSG_WRITE.LIBCMT ref: 00F7573A
                • Part of subcall function 00F7571C: RtlAllocateHeap.NTDLL(01160000,00000000,00000001,00000000,?,?,?,00F70DD3,?), ref: 00F7575F
              • std::exception::exception.LIBCMT ref: 00F70DEC
              • __CxxThrowException@8.LIBCMT ref: 00F70E01
                • Part of subcall function 00F7859B: RaiseException.KERNEL32(?,?,?,01009E78,00000000,?,?,?,?,00F70E06,?,01009E78,?,00000001), ref: 00F785F0
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
              • String ID:
              • API String ID: 3902256705-0
              • Opcode ID: 05b61e865deb9b2d93cfbdf6c60834d3e075d7ac1936adf1957c8995cefa022f
              • Instruction ID: aecccecd6c18fd0e649eb7da74a14f621dfbfbbc2b00067f5d8da72d4b339327
              • Opcode Fuzzy Hash: 05b61e865deb9b2d93cfbdf6c60834d3e075d7ac1936adf1957c8995cefa022f
              • Instruction Fuzzy Hash: F7F0A93194031EA6DB20AA95EC059DF77AC9F01361F108427F90C96152EFF49A51B1D3
              APIs
                • Part of subcall function 00F78B28: __getptd_noexit.LIBCMT ref: 00F78B28
              • __lock_file.LIBCMT ref: 00F753EB
                • Part of subcall function 00F76C11: __lock.LIBCMT ref: 00F76C34
              • __fclose_nolock.LIBCMT ref: 00F753F6
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
              • String ID:
              • API String ID: 2800547568-0
              • Opcode ID: 792b87cbe13b28840d33a6c719e230515e2ae53a67f3d934c6bb366abd00f64d
              • Instruction ID: 54cd20269e8e02b76d056c88e5fa1b63cea838ce9f3accad4c7245d5acea68a0
              • Opcode Fuzzy Hash: 792b87cbe13b28840d33a6c719e230515e2ae53a67f3d934c6bb366abd00f64d
              • Instruction Fuzzy Hash: DEF0F631800B049ADB51AFA59C057AD76A16F41BB0F20C21BA42CAB1D1CFFC8902BB53
              APIs
              • CreateProcessW.KERNELBASE(?,00000000), ref: 0120580B
              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 012058A1
              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 012058C3
              Memory Dump Source
              • Source File: 00000000.00000002.1345424818.0000000001203000.00000040.00000020.00020000.00000000.sdmp, Offset: 01203000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1203000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Process$ContextCreateMemoryReadThreadWow64
              • String ID:
              • API String ID: 2438371351-0
              • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
              • Instruction ID: 6a0a3db790f16cdc16b58abaea3e24110894aef147ea7a2c5144f541dd940930
              • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
              • Instruction Fuzzy Hash: 6912EE24E24658C6EB24DF64D8507DEB232EF68300F1091E9910DEB7A5E77A4F81CF5A
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ProtectVirtual
              • String ID:
              • API String ID: 544645111-0
              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
              • Instruction ID: ed7edb988424bb5017c2065cc0f4234cfecc8575f8f6c8d0388ebcb6ae61d59b
              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
              • Instruction Fuzzy Hash: DE31A271A00105DBC71ADF58C484A69FBA6FF59310B64C6A6E80ACB355DA31EDC1EB82
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ClearVariant
              • String ID:
              • API String ID: 1473721057-0
              • Opcode ID: 4e80b7dcd2cc5f1e90d4132ae107a7e8097649e483a52a1be3d392eb8d3eaa91
              • Instruction ID: 48300d7a1009467e326fd83dc69131aba62cad25cb899abb215361cd9d233939
              • Opcode Fuzzy Hash: 4e80b7dcd2cc5f1e90d4132ae107a7e8097649e483a52a1be3d392eb8d3eaa91
              • Instruction Fuzzy Hash: F3412974904341CFDB14DF14C448B1ABBE1BF45315F0989ACE99A8B362C736E849DF52
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _memmove
              • String ID:
              • API String ID: 4104443479-0
              • Opcode ID: e0697126b38e6f47aa4c2d4404504c4c4fddea326ad89a1e6dc5aa7ba61ffbe8
              • Instruction ID: e5904cf4b635213a0da6b7b4b37d0d4349ce5a2fb71dc3c72ba1ef52a01bc998
              • Opcode Fuzzy Hash: e0697126b38e6f47aa4c2d4404504c4c4fddea326ad89a1e6dc5aa7ba61ffbe8
              • Instruction Fuzzy Hash: DA212172A04709FBDB206F21F8417AA7BB8FF54351F21842AE98AC5194EB319590E701
              APIs
                • Part of subcall function 00F54BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00F54BEF
                • Part of subcall function 00F7525B: __wfsopen.LIBCMT ref: 00F75266
              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,010152F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F54E0F
                • Part of subcall function 00F54B6A: FreeLibrary.KERNEL32(00000000), ref: 00F54BA4
                • Part of subcall function 00F54C70: _memmove.LIBCMT ref: 00F54CBA
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Library$Free$Load__wfsopen_memmove
              • String ID:
              • API String ID: 1396898556-0
              • Opcode ID: c327bc37e676c2d8b354dfacbee2ca5606880a9bf940c1e2decd8c445e9dc55d
              • Instruction ID: d9f88e2bd563762a0f80b165f889f934c14b53875b9974d8434a3ab23d5e1e94
              • Opcode Fuzzy Hash: c327bc37e676c2d8b354dfacbee2ca5606880a9bf940c1e2decd8c445e9dc55d
              • Instruction Fuzzy Hash: 1611E732600206BBCF14FF74CC17FAD77A5AF84715F108429FA42A7181DB79AA48BB51
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ClearVariant
              • String ID:
              • API String ID: 1473721057-0
              • Opcode ID: c717ce5f4e34fda861725b11c0d29591af800dca5fa0e2ed9c63480454d1eb43
              • Instruction ID: 9ecfe88b0f1edba85ec811c3947703f977f5b71be81d17c06c213b05cad42df3
              • Opcode Fuzzy Hash: c717ce5f4e34fda861725b11c0d29591af800dca5fa0e2ed9c63480454d1eb43
              • Instruction Fuzzy Hash: 1C212270908301DFCB14DF24C844B1ABBE1BF88315F058968E98A57722D731E819EB92
              APIs
              • __lock_file.LIBCMT ref: 00F748A6
                • Part of subcall function 00F78B28: __getptd_noexit.LIBCMT ref: 00F78B28
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: __getptd_noexit__lock_file
              • String ID:
              • API String ID: 2597487223-0
              • Opcode ID: e4b15e5d1d949cc36fcb10c4ad09e68960151c2e9a27539013fd6df313518321
              • Instruction ID: 045101402a0667c6a4228946d22c8fb3f25077efd6cf0388569c38c99b7eaaa3
              • Opcode Fuzzy Hash: e4b15e5d1d949cc36fcb10c4ad09e68960151c2e9a27539013fd6df313518321
              • Instruction Fuzzy Hash: E4F0AF31941609ABDF12AFA48C0A7AE36A0AF00366F15C51AF42CDA191CB7C9952FB53
              APIs
              • FreeLibrary.KERNEL32(?,?,010152F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F54E7E
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: FreeLibrary
              • String ID:
              • API String ID: 3664257935-0
              • Opcode ID: ed2bd8d419ac3de1e7e8334e63db2fae3f5ef053fc83a704cbb1532639f6781f
              • Instruction ID: f1602e677b3a77b74dd3eb10a56e09c0bcd2a9ba293a750a2eda4c52ccc7c0a5
              • Opcode Fuzzy Hash: ed2bd8d419ac3de1e7e8334e63db2fae3f5ef053fc83a704cbb1532639f6781f
              • Instruction Fuzzy Hash: 1DF03071501751CFCB349F64E495816B7E1BF1433E320893EE6D782620C771A888EF40
              APIs
              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00F707B0
                • Part of subcall function 00F57BCC: _memmove.LIBCMT ref: 00F57C06
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: LongNamePath_memmove
              • String ID:
              • API String ID: 2514874351-0
              • Opcode ID: 5b7181f1faafae0189510326befc07633603fee731776aae89f7d05f82d83dac
              • Instruction ID: 9a2aa9b10b87b40881fab748107254adea41a176eef581a90b1e3fd313900665
              • Opcode Fuzzy Hash: 5b7181f1faafae0189510326befc07633603fee731776aae89f7d05f82d83dac
              • Instruction Fuzzy Hash: 62E0CD3690522857C720E6689C05FEA77DDDFC87A1F0441F6FD0CD7248D9649C9496D0
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: __wfsopen
              • String ID:
              • API String ID: 197181222-0
              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
              • Instruction ID: dc17ff63bac3aed415199946a69c6943cb9892668f29686fc0b3f48e0f837833
              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
              • Instruction Fuzzy Hash: CCB0927644020C77CE012A82EC02A493B199B46B64F408021FB0C18162A6B7A664AA8A
              APIs
              • Sleep.KERNELBASE(000001F4), ref: 01206061
              Memory Dump Source
              • Source File: 00000000.00000002.1345424818.0000000001203000.00000040.00000020.00020000.00000000.sdmp, Offset: 01203000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1203000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
              • Instruction ID: adb569a4b27f3653b9fb334b95b349eddeafb65c9d67998eaeb8a82dca604753
              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
              • Instruction Fuzzy Hash: 77E0E67498010DDFDB00EFB4D54969E7FB4FF04301F100261FD01D2281D6319D608A62
              APIs
                • Part of subcall function 00F52612: GetWindowLongW.USER32(?,000000EB), ref: 00F52623
              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00FDCB37
              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00FDCB95
              • GetWindowLongW.USER32(?,000000F0), ref: 00FDCBD6
              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00FDCC00
              • SendMessageW.USER32 ref: 00FDCC29
              • _wcsncpy.LIBCMT ref: 00FDCC95
              • GetKeyState.USER32(00000011), ref: 00FDCCB6
              • GetKeyState.USER32(00000009), ref: 00FDCCC3
              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00FDCCD9
              • GetKeyState.USER32(00000010), ref: 00FDCCE3
              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00FDCD0C
              • SendMessageW.USER32 ref: 00FDCD33
              • SendMessageW.USER32(?,00001030,?,00FDB348), ref: 00FDCE37
              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00FDCE4D
              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00FDCE60
              • SetCapture.USER32(?), ref: 00FDCE69
              • ClientToScreen.USER32(?,?), ref: 00FDCECE
              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00FDCEDB
              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00FDCEF5
              • ReleaseCapture.USER32 ref: 00FDCF00
              • GetCursorPos.USER32(?), ref: 00FDCF3A
              • ScreenToClient.USER32(?,?), ref: 00FDCF47
              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00FDCFA3
              • SendMessageW.USER32 ref: 00FDCFD1
              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00FDD00E
              • SendMessageW.USER32 ref: 00FDD03D
              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00FDD05E
              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00FDD06D
              • GetCursorPos.USER32(?), ref: 00FDD08D
              • ScreenToClient.USER32(?,?), ref: 00FDD09A
              • GetParent.USER32(?), ref: 00FDD0BA
              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00FDD123
              • SendMessageW.USER32 ref: 00FDD154
              • ClientToScreen.USER32(?,?), ref: 00FDD1B2
              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00FDD1E2
              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00FDD20C
              • SendMessageW.USER32 ref: 00FDD22F
              • ClientToScreen.USER32(?,?), ref: 00FDD281
              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00FDD2B5
                • Part of subcall function 00F525DB: GetWindowLongW.USER32(?,000000EB), ref: 00F525EC
              • GetWindowLongW.USER32(?,000000F0), ref: 00FDD351
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
              • String ID: @GUI_DRAGID$F
              • API String ID: 3977979337-4164748364
              • Opcode ID: 9e4273286fe33ba1ce3c2757d3281a0448de09860502c525af08c948f59494c1
              • Instruction ID: e703447f43c703c73bb2e49110bd17aebba0110f51d0d572b60af0bc40e4cc43
              • Opcode Fuzzy Hash: 9e4273286fe33ba1ce3c2757d3281a0448de09860502c525af08c948f59494c1
              • Instruction Fuzzy Hash: 86429F74605241AFD725CF24C845FAABBE6FF89320F18061BF6969B3A1C731D844EB91
              APIs
              • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00FD84D0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: %d/%02d/%02d
              • API String ID: 3850602802-328681919
              • Opcode ID: bf11c60a5482daa553e5d742ccd7a9f8aa8b045f05931cb6fbd070e5864100df
              • Instruction ID: 9277581ff1beb2ffa1eb74ce884486353d3a8103ce5761ab90110de78b20ea00
              • Opcode Fuzzy Hash: bf11c60a5482daa553e5d742ccd7a9f8aa8b045f05931cb6fbd070e5864100df
              • Instruction Fuzzy Hash: E512F671901309ABEB249F24CC49FAF7BA6EF46350F18412AF906DB2D1DF748946EB50
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _memmove$_memset
              • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
              • API String ID: 1357608183-1798697756
              • Opcode ID: ffbf4b89143c2c324ea049d1b72a5189c3349151c6e168fc4022e38d69f594ef
              • Instruction ID: a3a2b7a026527ffebf4ad32bc059cfbfae766c39bad3c03c0ebcbe79f01b0e59
              • Opcode Fuzzy Hash: ffbf4b89143c2c324ea049d1b72a5189c3349151c6e168fc4022e38d69f594ef
              • Instruction Fuzzy Hash: BB93C3B1E04215DFDB24CF98C881BADB7B1FF49324F25816AE945AB381E7749D81EB40
              APIs
              • GetForegroundWindow.USER32(00000000,?), ref: 00F548DF
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F8D665
              • IsIconic.USER32(?), ref: 00F8D66E
              • ShowWindow.USER32(?,00000009), ref: 00F8D67B
              • SetForegroundWindow.USER32(?), ref: 00F8D685
              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F8D69B
              • GetCurrentThreadId.KERNEL32 ref: 00F8D6A2
              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F8D6AE
              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F8D6BF
              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F8D6C7
              • AttachThreadInput.USER32(00000000,?,00000001), ref: 00F8D6CF
              • SetForegroundWindow.USER32(?), ref: 00F8D6D2
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F8D6E7
              • keybd_event.USER32(00000012,00000000), ref: 00F8D6F2
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F8D6FC
              • keybd_event.USER32(00000012,00000000), ref: 00F8D701
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F8D70A
              • keybd_event.USER32(00000012,00000000), ref: 00F8D70F
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F8D719
              • keybd_event.USER32(00000012,00000000), ref: 00F8D71E
              • SetForegroundWindow.USER32(?), ref: 00F8D721
              • AttachThreadInput.USER32(?,?,00000000), ref: 00F8D748
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
              • String ID: Shell_TrayWnd
              • API String ID: 4125248594-2988720461
              • Opcode ID: 42afb4c9ce8591dbaa140a7662f128e177dd971776c7fd4570bfefd0f65cc44c
              • Instruction ID: feeba46267f129233512cee462c377cfde1118bec241851c0830b96a251ad0e4
              • Opcode Fuzzy Hash: 42afb4c9ce8591dbaa140a7662f128e177dd971776c7fd4570bfefd0f65cc44c
              • Instruction Fuzzy Hash: DA316071A4131CBAEB206B719C89FBF7F6DEF44B60F144066FA05EA1D1D6B05900BBA0
              APIs
                • Part of subcall function 00FA87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FA882B
                • Part of subcall function 00FA87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FA8858
                • Part of subcall function 00FA87E1: GetLastError.KERNEL32 ref: 00FA8865
              • _memset.LIBCMT ref: 00FA8353
              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00FA83A5
              • CloseHandle.KERNEL32(?), ref: 00FA83B6
              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00FA83CD
              • GetProcessWindowStation.USER32 ref: 00FA83E6
              • SetProcessWindowStation.USER32(00000000), ref: 00FA83F0
              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00FA840A
                • Part of subcall function 00FA81CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FA8309), ref: 00FA81E0
                • Part of subcall function 00FA81CB: CloseHandle.KERNEL32(?,?,00FA8309), ref: 00FA81F2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
              • String ID: $default$winsta0
              • API String ID: 2063423040-1027155976
              • Opcode ID: e5a2093b39497f581ad9090e74592de8a2002de0a6959bb925f92e9c5c66f268
              • Instruction ID: 3833037517e49a149a13cb15a5689553dffb80b3d2d7db74728b6d182d3bfa59
              • Opcode Fuzzy Hash: e5a2093b39497f581ad9090e74592de8a2002de0a6959bb925f92e9c5c66f268
              • Instruction Fuzzy Hash: 34818CB1C01209AFDF119FA4CC45EEE7BB9EF05364F18406AFC11A2261DB758E06EB20
              APIs
              • FindFirstFileW.KERNEL32(?,?), ref: 00FBC78D
              • FindClose.KERNEL32(00000000), ref: 00FBC7E1
              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FBC806
              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00FBC81D
              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00FBC844
              • __swprintf.LIBCMT ref: 00FBC890
              • __swprintf.LIBCMT ref: 00FBC8D3
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
              • __swprintf.LIBCMT ref: 00FBC927
                • Part of subcall function 00F73698: __woutput_l.LIBCMT ref: 00F736F1
              • __swprintf.LIBCMT ref: 00FBC975
                • Part of subcall function 00F73698: __flsbuf.LIBCMT ref: 00F73713
                • Part of subcall function 00F73698: __flsbuf.LIBCMT ref: 00F7372B
              • __swprintf.LIBCMT ref: 00FBC9C4
              • __swprintf.LIBCMT ref: 00FBCA13
              • __swprintf.LIBCMT ref: 00FBCA62
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
              • API String ID: 3953360268-2428617273
              • Opcode ID: a72497f66b59f69a1c54911e49cd7b0429149649445093642ee48b5a262c526e
              • Instruction ID: fece7b96efeaec30baab89e5a0be62ce06e85787e7a06c8a966d9659ad59d57e
              • Opcode Fuzzy Hash: a72497f66b59f69a1c54911e49cd7b0429149649445093642ee48b5a262c526e
              • Instruction Fuzzy Hash: 14A110B2408344ABD704EFA4CC85DAFB7ECBF94705F40491EFA9586151EB78DA08DB62
              APIs
              • FindFirstFileW.KERNEL32(?,?,756E8FB0,?,00000000), ref: 00FBEFB6
              • _wcscmp.LIBCMT ref: 00FBEFCB
              • _wcscmp.LIBCMT ref: 00FBEFE2
              • GetFileAttributesW.KERNEL32(?), ref: 00FBEFF4
              • SetFileAttributesW.KERNEL32(?,?), ref: 00FBF00E
              • FindNextFileW.KERNEL32(00000000,?), ref: 00FBF026
              • FindClose.KERNEL32(00000000), ref: 00FBF031
              • FindFirstFileW.KERNEL32(*.*,?), ref: 00FBF04D
              • _wcscmp.LIBCMT ref: 00FBF074
              • _wcscmp.LIBCMT ref: 00FBF08B
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FBF09D
              • SetCurrentDirectoryW.KERNEL32(01008920), ref: 00FBF0BB
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FBF0C5
              • FindClose.KERNEL32(00000000), ref: 00FBF0D2
              • FindClose.KERNEL32(00000000), ref: 00FBF0E4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
              • String ID: *.*
              • API String ID: 1803514871-438819550
              • Opcode ID: 953ed17d005cbca3c8cc4ad91556244c18da28fb358f49d9d8c71c6b816295c6
              • Instruction ID: 559616212d3793941c4ed5a57225ee3907007daa08c9ae4189b291a481e05835
              • Opcode Fuzzy Hash: 953ed17d005cbca3c8cc4ad91556244c18da28fb358f49d9d8c71c6b816295c6
              • Instruction Fuzzy Hash: 1431033690120D7ADB10ABB5DC48EEE77ADAF483A0F044177E845D20A1DB30DA48FE61
              APIs
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FD0953
              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00FDF910,00000000,?,00000000,?,?), ref: 00FD09C1
              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00FD0A09
              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00FD0A92
              • RegCloseKey.ADVAPI32(?), ref: 00FD0DB2
              • RegCloseKey.ADVAPI32(00000000), ref: 00FD0DBF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Close$ConnectCreateRegistryValue
              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
              • API String ID: 536824911-966354055
              • Opcode ID: 3919f0ef67266cad0b386c4257adba52d5e8053fbbfc4750f50cb7592b2067eb
              • Instruction ID: 2724fbe36921f05a78ec298135d56646a36587ad1c1e415f54ebadbe822f7473
              • Opcode Fuzzy Hash: 3919f0ef67266cad0b386c4257adba52d5e8053fbbfc4750f50cb7592b2067eb
              • Instruction Fuzzy Hash: ED027C756046019FCB14EF24C841E2AB7E6FF89325F08845EF98A9B362CB74ED05DB81
              APIs
              • FindFirstFileW.KERNEL32(?,?,756E8FB0,?,00000000), ref: 00FBF113
              • _wcscmp.LIBCMT ref: 00FBF128
              • _wcscmp.LIBCMT ref: 00FBF13F
                • Part of subcall function 00FB4385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00FB43A0
              • FindNextFileW.KERNEL32(00000000,?), ref: 00FBF16E
              • FindClose.KERNEL32(00000000), ref: 00FBF179
              • FindFirstFileW.KERNEL32(*.*,?), ref: 00FBF195
              • _wcscmp.LIBCMT ref: 00FBF1BC
              • _wcscmp.LIBCMT ref: 00FBF1D3
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FBF1E5
              • SetCurrentDirectoryW.KERNEL32(01008920), ref: 00FBF203
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FBF20D
              • FindClose.KERNEL32(00000000), ref: 00FBF21A
              • FindClose.KERNEL32(00000000), ref: 00FBF22C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
              • String ID: *.*
              • API String ID: 1824444939-438819550
              • Opcode ID: 74af3cf8ff9ad85a4893f60a95588d4165f90bb4ef1e09b79d23489bc31e4054
              • Instruction ID: 8e357986f04858444b9dfd7a46ec90f6d60964ac6f7ab2b94eb29ceb8f441a92
              • Opcode Fuzzy Hash: 74af3cf8ff9ad85a4893f60a95588d4165f90bb4ef1e09b79d23489bc31e4054
              • Instruction Fuzzy Hash: 1831123690120E7ADB20ABB5EC48EEE73AC9F45330F184176E845E20A0DB30DE48FE54
              APIs
              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00FBA20F
              • __swprintf.LIBCMT ref: 00FBA231
              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00FBA26E
              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00FBA293
              • _memset.LIBCMT ref: 00FBA2B2
              • _wcsncpy.LIBCMT ref: 00FBA2EE
              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00FBA323
              • CloseHandle.KERNEL32(00000000), ref: 00FBA32E
              • RemoveDirectoryW.KERNEL32(?), ref: 00FBA337
              • CloseHandle.KERNEL32(00000000), ref: 00FBA341
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
              • String ID: :$\$\??\%s
              • API String ID: 2733774712-3457252023
              • Opcode ID: fa3e119330e393c22c469e690e820c4654a30c1301c36a10779fbe40e5a901bd
              • Instruction ID: 1f1f942baeabb3a5f9af0b6b67398ebfac07ecf1c45f1fb5e7ea9eefbba6c233
              • Opcode Fuzzy Hash: fa3e119330e393c22c469e690e820c4654a30c1301c36a10779fbe40e5a901bd
              • Instruction Fuzzy Hash: F631EFB2900109ABDB21DFA1DC49FEB37BDEF88710F1440B6F509D2160EB749744AB25
              APIs
                • Part of subcall function 00FA8202: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FA821E
                • Part of subcall function 00FA8202: GetLastError.KERNEL32(?,00FA7CE2,?,?,?), ref: 00FA8228
                • Part of subcall function 00FA8202: GetProcessHeap.KERNEL32(00000008,?,?,00FA7CE2,?,?,?), ref: 00FA8237
                • Part of subcall function 00FA8202: HeapAlloc.KERNEL32(00000000,?,00FA7CE2,?,?,?), ref: 00FA823E
                • Part of subcall function 00FA8202: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FA8255
                • Part of subcall function 00FA829F: GetProcessHeap.KERNEL32(00000008,00FA7CF8,00000000,00000000,?,00FA7CF8,?), ref: 00FA82AB
                • Part of subcall function 00FA829F: HeapAlloc.KERNEL32(00000000,?,00FA7CF8,?), ref: 00FA82B2
                • Part of subcall function 00FA829F: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00FA7CF8,?), ref: 00FA82C3
              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00FA7D13
              • _memset.LIBCMT ref: 00FA7D28
              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00FA7D47
              • GetLengthSid.ADVAPI32(?), ref: 00FA7D58
              • GetAce.ADVAPI32(?,00000000,?), ref: 00FA7D95
              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00FA7DB1
              • GetLengthSid.ADVAPI32(?), ref: 00FA7DCE
              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00FA7DDD
              • HeapAlloc.KERNEL32(00000000), ref: 00FA7DE4
              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00FA7E05
              • CopySid.ADVAPI32(00000000), ref: 00FA7E0C
              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00FA7E3D
              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00FA7E63
              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00FA7E77
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
              • String ID:
              • API String ID: 3996160137-0
              • Opcode ID: 3bf0d7ec3bec332e6ec62901c3c98bb85a0185397811833c3b7205b0d97d7854
              • Instruction ID: 423a437060b541d489b2b866e4d89c60aadd5f93b8a69f6bda8c85bdb88a333b
              • Opcode Fuzzy Hash: 3bf0d7ec3bec332e6ec62901c3c98bb85a0185397811833c3b7205b0d97d7854
              • Instruction Fuzzy Hash: 73613EB1904209AFDF00DFA4DC85EEEBB7AFF05310F04816AE915A7291DB759E05EB60
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID:
              • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
              • API String ID: 0-4052911093
              • Opcode ID: 579e74905e6a82a56962c9345f287ccdbb934d419e8c223f3fdbfae6a3cad603
              • Instruction ID: af12baa23bf8b7e406802afc54be2686705df0c694d249c23b633006174de073
              • Opcode Fuzzy Hash: 579e74905e6a82a56962c9345f287ccdbb934d419e8c223f3fdbfae6a3cad603
              • Instruction Fuzzy Hash: 597271B5E00219DBDF14CF58C8807AEB7B5FF49720F15816AE849EB291EB349D41EB90
              APIs
              • GetKeyboardState.USER32(?), ref: 00FB0097
              • SetKeyboardState.USER32(?), ref: 00FB0102
              • GetAsyncKeyState.USER32(000000A0), ref: 00FB0122
              • GetKeyState.USER32(000000A0), ref: 00FB0139
              • GetAsyncKeyState.USER32(000000A1), ref: 00FB0168
              • GetKeyState.USER32(000000A1), ref: 00FB0179
              • GetAsyncKeyState.USER32(00000011), ref: 00FB01A5
              • GetKeyState.USER32(00000011), ref: 00FB01B3
              • GetAsyncKeyState.USER32(00000012), ref: 00FB01DC
              • GetKeyState.USER32(00000012), ref: 00FB01EA
              • GetAsyncKeyState.USER32(0000005B), ref: 00FB0213
              • GetKeyState.USER32(0000005B), ref: 00FB0221
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: State$Async$Keyboard
              • String ID:
              • API String ID: 541375521-0
              • Opcode ID: 45df1fa19b9b8ed04b8c8e26d4c37db01a89d8b969cb9c463d397db765e0c747
              • Instruction ID: 3105378d33bc999f77a85d8d6c63c84a743a193db2be761e6190159c80b513c1
              • Opcode Fuzzy Hash: 45df1fa19b9b8ed04b8c8e26d4c37db01a89d8b969cb9c463d397db765e0c747
              • Instruction Fuzzy Hash: 6851D820D0478829FB35EBB588547EBBFB49F01390F08459A95C2561C2DEA49B8CEF61
              APIs
                • Part of subcall function 00FD0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FCFDAD,?,?), ref: 00FD0E31
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FD04AC
                • Part of subcall function 00F59837: __itow.LIBCMT ref: 00F59862
                • Part of subcall function 00F59837: __swprintf.LIBCMT ref: 00F598AC
              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00FD054B
              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00FD05E3
              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00FD0822
              • RegCloseKey.ADVAPI32(00000000), ref: 00FD082F
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
              • String ID:
              • API String ID: 1240663315-0
              • Opcode ID: 686db99ed279ad95c5a730ea3e3f1957fa59a36efefcfde79ca607d5c167a1f8
              • Instruction ID: 69b47334c6e6a7303fbbbe3151a3ac11fc499debd1c5948217d82c09929b4ccc
              • Opcode Fuzzy Hash: 686db99ed279ad95c5a730ea3e3f1957fa59a36efefcfde79ca607d5c167a1f8
              • Instruction Fuzzy Hash: 58E15F71604204AFCB14DF24CC95E2ABBE5EF89314F08856EF94ADB361DA34ED05EB52
              APIs
                • Part of subcall function 00F59837: __itow.LIBCMT ref: 00F59862
                • Part of subcall function 00F59837: __swprintf.LIBCMT ref: 00F598AC
              • CoInitialize.OLE32 ref: 00FC8403
              • CoUninitialize.OLE32 ref: 00FC840E
              • CoCreateInstance.OLE32(?,00000000,00000017,00FE2BEC,?), ref: 00FC846E
              • IIDFromString.OLE32(?,?), ref: 00FC84E1
              • VariantInit.OLEAUT32(?), ref: 00FC857B
              • VariantClear.OLEAUT32(?), ref: 00FC85DC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
              • API String ID: 834269672-1287834457
              • Opcode ID: 641073f71cc11ae785e62ab0dc1900fed2c01548a3a59edf15d2458cf5d33a6c
              • Instruction ID: 8588b8af20a2aac4f1e81f1bd614d787bb21738f1fb299f8910cb18a859a698a
              • Opcode Fuzzy Hash: 641073f71cc11ae785e62ab0dc1900fed2c01548a3a59edf15d2458cf5d33a6c
              • Instruction Fuzzy Hash: A961F271608312DFC714DF20C94AF6AB7E4AF457A4F04481DF9829B291CBB4ED49EB92
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
              • String ID:
              • API String ID: 1737998785-0
              • Opcode ID: 85914d95412a39867ff228ff54d4c56a8229d29f785b307ee4c37f62d7de6011
              • Instruction ID: 6f6b8d14af41781fd500835798e077a38e78008f9914a7a54c67a7e26e5a0ae4
              • Opcode Fuzzy Hash: 85914d95412a39867ff228ff54d4c56a8229d29f785b307ee4c37f62d7de6011
              • Instruction Fuzzy Hash: 3221D1356012159FDB11AF20DC1AF6D7BA9EF45322F18802AF986DB2A1CB74ED00EB44
              APIs
                • Part of subcall function 00F54750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F54743,?,?,00F537AE,?), ref: 00F54770
                • Part of subcall function 00FB4A31: GetFileAttributesW.KERNEL32(?,00FB370B), ref: 00FB4A32
              • FindFirstFileW.KERNEL32(?,?), ref: 00FB38A3
              • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00FB394B
              • MoveFileW.KERNEL32(?,?), ref: 00FB395E
              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00FB397B
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FB399D
              • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00FB39B9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
              • String ID: \*.*
              • API String ID: 4002782344-1173974218
              • Opcode ID: e09d22c9915c31934f67ef1a8e90d0bba81c1ead1a08dfc607b759785ba207f5
              • Instruction ID: 4edbf64e7fddc6cfc53d8f7d89665ec6e7c2debaff8c1692160cbd939c971c24
              • Opcode Fuzzy Hash: e09d22c9915c31934f67ef1a8e90d0bba81c1ead1a08dfc607b759785ba207f5
              • Instruction Fuzzy Hash: 1A516E3184514CAACF01FBA1DE929EDB779AF14311F600169E806B61A1EB296F0DEF61
              APIs
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
              • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00FBF440
              • Sleep.KERNEL32(0000000A), ref: 00FBF470
              • _wcscmp.LIBCMT ref: 00FBF484
              • _wcscmp.LIBCMT ref: 00FBF49F
              • FindNextFileW.KERNEL32(?,?), ref: 00FBF53D
              • FindClose.KERNEL32(00000000), ref: 00FBF553
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
              • String ID: *.*
              • API String ID: 713712311-438819550
              • Opcode ID: 6b7de38d041ffc6a6b7e82cd7aed84a01d0336a2979504bd9a6a5c0770b11f87
              • Instruction ID: d63d2a7264698e2b3d0ba4e00343b67afb5aa647e6e3f317a8f90537a4d29d07
              • Opcode Fuzzy Hash: 6b7de38d041ffc6a6b7e82cd7aed84a01d0336a2979504bd9a6a5c0770b11f87
              • Instruction Fuzzy Hash: BC417C71D0021AAFCF10EF65DC49AEEBBB4FF05320F184466E815A3291DB349A58EF50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _memmove
              • String ID:
              • API String ID: 4104443479-0
              • Opcode ID: d1e67dfbbc21c9640528d7eeba72167a85397b01a6b2a9bc68bb59c695268349
              • Instruction ID: 30908e891a00ea5ee2e36c5a6e7b757738c1b5173d44145d7c7984305fdcdb89
              • Opcode Fuzzy Hash: d1e67dfbbc21c9640528d7eeba72167a85397b01a6b2a9bc68bb59c695268349
              • Instruction Fuzzy Hash: 0D12AAB0A00609DFCF14DFA4D981AAEB7F5FF48310F104529E846E7290EB3AAD15EB51
              APIs
                • Part of subcall function 00F54750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F54743,?,?,00F537AE,?), ref: 00F54770
                • Part of subcall function 00FB4A31: GetFileAttributesW.KERNEL32(?,00FB370B), ref: 00FB4A32
              • FindFirstFileW.KERNEL32(?,?), ref: 00FB3B89
              • DeleteFileW.KERNEL32(?,?,?,?), ref: 00FB3BD9
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00FB3BEA
              • FindClose.KERNEL32(00000000), ref: 00FB3C01
              • FindClose.KERNEL32(00000000), ref: 00FB3C0A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
              • String ID: \*.*
              • API String ID: 2649000838-1173974218
              • Opcode ID: 8f78ddc15f0141d6a04f930716bd459981d9c2008b67008df315de203e2525e9
              • Instruction ID: 63d60df0bf38e530a12e47105fcc2f4cc68137b1e9dd1e97ca4797e5a950e21a
              • Opcode Fuzzy Hash: 8f78ddc15f0141d6a04f930716bd459981d9c2008b67008df315de203e2525e9
              • Instruction Fuzzy Hash: C831A1310493849BC200EF64DC91CEFBBE8AE91315F404E2DF9D592191EB25DA0CEB53
              APIs
                • Part of subcall function 00FA87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FA882B
                • Part of subcall function 00FA87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FA8858
                • Part of subcall function 00FA87E1: GetLastError.KERNEL32 ref: 00FA8865
              • ExitWindowsEx.USER32(?,00000000), ref: 00FB51F9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
              • String ID: $@$SeShutdownPrivilege
              • API String ID: 2234035333-194228
              • Opcode ID: e67c58b2ac2d016bfb5de4c97ea943333b016d0c26c59162e3d30a271fd75dc0
              • Instruction ID: dc12ba49075b2c5404b70ec705fb9c00d86f793ff525cb45e8e0d11d7e6c8ad4
              • Opcode Fuzzy Hash: e67c58b2ac2d016bfb5de4c97ea943333b016d0c26c59162e3d30a271fd75dc0
              • Instruction Fuzzy Hash: C3014732A936152BF728227AAC8BFFA7358AB05B50F240421F803E20C2DA591C05BD90
              APIs
              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00FC62DC
              • WSAGetLastError.WSOCK32(00000000), ref: 00FC62EB
              • bind.WSOCK32(00000000,?,00000010), ref: 00FC6307
              • listen.WSOCK32(00000000,00000005), ref: 00FC6316
              • WSAGetLastError.WSOCK32(00000000), ref: 00FC6330
              • closesocket.WSOCK32(00000000,00000000), ref: 00FC6344
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ErrorLast$bindclosesocketlistensocket
              • String ID:
              • API String ID: 1279440585-0
              • Opcode ID: adc3587633fcc7a3c901bffd2c19d917de6fad3be10a485110710c6df3527012
              • Instruction ID: f4af9bcfbe938a8e3c10bb5770cb1647f266bbbb79887547472e32fed2574c88
              • Opcode Fuzzy Hash: adc3587633fcc7a3c901bffd2c19d917de6fad3be10a485110710c6df3527012
              • Instruction Fuzzy Hash: F821CC31A04205AFCB00AF64CD46F6EB7A9EF48321F188159E916E73D1C774AD09EB51
              APIs
                • Part of subcall function 00F70DB6: std::exception::exception.LIBCMT ref: 00F70DEC
                • Part of subcall function 00F70DB6: __CxxThrowException@8.LIBCMT ref: 00F70E01
              • _memmove.LIBCMT ref: 00FA0258
              • _memmove.LIBCMT ref: 00FA036D
              • _memmove.LIBCMT ref: 00FA0414
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _memmove$Exception@8Throwstd::exception::exception
              • String ID:
              • API String ID: 1300846289-0
              • Opcode ID: 3fab6ca70bc63599526c8590f51dc90f8b520f20ac9dafd28c3d02a533361019
              • Instruction ID: e31c34dcb1e320bd92e641584af19aefaba84b754ae556e28cb6b4bfcbd7a536
              • Opcode Fuzzy Hash: 3fab6ca70bc63599526c8590f51dc90f8b520f20ac9dafd28c3d02a533361019
              • Instruction Fuzzy Hash: 6F02BFB1A00209DBCF04DF64D981AAE7BB5EF45310F548069E80AEB295EF39DD14EB91
              APIs
                • Part of subcall function 00F52612: GetWindowLongW.USER32(?,000000EB), ref: 00F52623
              • DefDlgProcW.USER32(?,?,?,?,?), ref: 00F519FA
              • GetSysColor.USER32(0000000F), ref: 00F51A4E
              • SetBkColor.GDI32(?,00000000), ref: 00F51A61
                • Part of subcall function 00F51290: DefDlgProcW.USER32(?,00000020,?), ref: 00F512D8
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ColorProc$LongWindow
              • String ID:
              • API String ID: 3744519093-0
              • Opcode ID: 4d0af6bd5eec23f53df1adcdb54eff01553b0e047f5f708a7fbfb22a76ef2fd9
              • Instruction ID: bc2d9e9ff645b4bddc8604b28b7b5b43be624e7c851edd30f4e03784e0d2a471
              • Opcode Fuzzy Hash: 4d0af6bd5eec23f53df1adcdb54eff01553b0e047f5f708a7fbfb22a76ef2fd9
              • Instruction Fuzzy Hash: 94A15B76502586BAE639BA285C45FBF395DFB42353B14010AFF02D5182CA1DAD09F3B1
              APIs
              • FindFirstFileW.KERNEL32(?,?), ref: 00FBBCE6
              • _wcscmp.LIBCMT ref: 00FBBD16
              • _wcscmp.LIBCMT ref: 00FBBD2B
              • FindNextFileW.KERNEL32(00000000,?), ref: 00FBBD3C
              • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00FBBD6C
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Find$File_wcscmp$CloseFirstNext
              • String ID:
              • API String ID: 2387731787-0
              • Opcode ID: c0e95d8cd78a632d644bf7d72a08e9d4d25466e21407db581f970f983aa48168
              • Instruction ID: ccb6e6d0c6f06a1c15d2030578f15cabb8f447cf50602a7daadea81b89359ff7
              • Opcode Fuzzy Hash: c0e95d8cd78a632d644bf7d72a08e9d4d25466e21407db581f970f983aa48168
              • Instruction Fuzzy Hash: 86518E35A047029FC714DF69C890E9AB3E4EF49320F14461EE9568B3A1DB78ED04EF91
              APIs
                • Part of subcall function 00FC7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00FC7DB6
              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00FC679E
              • WSAGetLastError.WSOCK32(00000000), ref: 00FC67C7
              • bind.WSOCK32(00000000,?,00000010), ref: 00FC6800
              • WSAGetLastError.WSOCK32(00000000), ref: 00FC680D
              • closesocket.WSOCK32(00000000,00000000), ref: 00FC6821
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ErrorLast$bindclosesocketinet_addrsocket
              • String ID:
              • API String ID: 99427753-0
              • Opcode ID: f19b679ab75e1427bd50a07a7259f0a185e5ef69a32cc98fa15de967868624cb
              • Instruction ID: aa13066c73774e589073a681a1f182d9e313f155a00b86790d12f4b8e74b3c67
              • Opcode Fuzzy Hash: f19b679ab75e1427bd50a07a7259f0a185e5ef69a32cc98fa15de967868624cb
              • Instruction Fuzzy Hash: 9341F371A00600AFDB14AF248C86F2E77E89F05715F44845CFE06AB3D2CAB89D04AB91
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$EnabledForegroundIconicVisibleZoomed
              • String ID:
              • API String ID: 292994002-0
              • Opcode ID: c155cfac2202a64dbbfbbbabde0884bd724be16cf86fe331e52979e398da3ba0
              • Instruction ID: 167f2a1563d9dc18803e4c1becda6b928917547775c6435145f39ffa7288efc3
              • Opcode Fuzzy Hash: c155cfac2202a64dbbfbbbabde0884bd724be16cf86fe331e52979e398da3ba0
              • Instruction Fuzzy Hash: 8C1104327019146FDB216F26DC44F6E7B9BEF45BA2B48402AF846D7341CBB4DD01AAA0
              APIs
              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FA80C0
              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FA80CA
              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FA80D9
              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FA80E0
              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FA80F6
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: HeapInformationToken$AllocErrorLastProcess
              • String ID:
              • API String ID: 44706859-0
              • Opcode ID: d382d72dace445f352e25ec899e02494e0846868a3540707e7ea7fb8af2f637a
              • Instruction ID: bbe07f9573a65d618c88b06ba206e0af556cf381c3571f936456d8b6d5965099
              • Opcode Fuzzy Hash: d382d72dace445f352e25ec899e02494e0846868a3540707e7ea7fb8af2f637a
              • Instruction Fuzzy Hash: 20F06271641208AFEB100FB5EC8DE673BBDEF4A7A5B040026F946C7150CBA19D46EA60
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,?,00F54AD0), ref: 00F54B45
              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00F54B57
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: GetNativeSystemInfo$kernel32.dll
              • API String ID: 2574300362-192647395
              • Opcode ID: 8a086014487af463eb86653bbebb2d6f907392c861b73b5d9c71c9d700bda664
              • Instruction ID: 2bc97f723ec918d25636d08cec14f53f33616c80410076c6f68b747117fafb42
              • Opcode Fuzzy Hash: 8a086014487af463eb86653bbebb2d6f907392c861b73b5d9c71c9d700bda664
              • Instruction Fuzzy Hash: 99D0C230E00317DFC7208F31D818F0272D5AF81355B18883B9883C2250D770E4C8E614
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: __itow__swprintf
              • String ID:
              • API String ID: 674341424-0
              • Opcode ID: 0d775bbc584e1e2c0f69c4cee5af9d6f636b48a44497f2eb96c67860debe42f7
              • Instruction ID: ac953a1e637f5bfc706f66c355c12c2e15da69dc53bee0ef12682e437c5e4569
              • Opcode Fuzzy Hash: 0d775bbc584e1e2c0f69c4cee5af9d6f636b48a44497f2eb96c67860debe42f7
              • Instruction Fuzzy Hash: 0522CD71A083009FDB24DF24C881B6FB7E4EF84714F04492DF99A97291DB75E908EB92
              APIs
              • CreateToolhelp32Snapshot.KERNEL32 ref: 00FCEE3D
              • Process32FirstW.KERNEL32(00000000,?), ref: 00FCEE4B
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
              • Process32NextW.KERNEL32(00000000,?), ref: 00FCEF0B
              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00FCEF1A
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
              • String ID:
              • API String ID: 2576544623-0
              • Opcode ID: 60bd3a34a16df1d8ca18ffd60b910b4d0a4ea23d36fc083e64f7894b9d538966
              • Instruction ID: b8c4d4edc35e8fa60ac65cb7b51c1b3ab7f652cc043de97910f23dcf397d3a4f
              • Opcode Fuzzy Hash: 60bd3a34a16df1d8ca18ffd60b910b4d0a4ea23d36fc083e64f7894b9d538966
              • Instruction Fuzzy Hash: DD51AF71508701AFD310EF20DC86E6BBBE8EF84750F50482DF995972A1EB74E908DB92
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: BuffCharUpper
              • String ID:
              • API String ID: 3964851224-0
              • Opcode ID: 81ae574ecbd5a039c9266b265201b0174da2d4438ad3139219d1d05616f3cfae
              • Instruction ID: 513909ab07e2ad2503763883e60931d50f02b772eb2ac5cf80cd9193d57177ab
              • Opcode Fuzzy Hash: 81ae574ecbd5a039c9266b265201b0174da2d4438ad3139219d1d05616f3cfae
              • Instruction Fuzzy Hash: 17926971A083419FD724DF14C480B2BB7E1BF85314F24896DE98A8B352DB75EC49EB92
              APIs
              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00FAE628
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: lstrlen
              • String ID: ($|
              • API String ID: 1659193697-1631851259
              • Opcode ID: 29629ef8138225c79713dde28818a392dc0b39da12f9d557379efffea27966da
              • Instruction ID: a369be4d9aa1a5f40d20c07b70759953b3b98122b2c8e6bc020f01bdd7b52cbe
              • Opcode Fuzzy Hash: 29629ef8138225c79713dde28818a392dc0b39da12f9d557379efffea27966da
              • Instruction Fuzzy Hash: 623225B5A007059FD728CF59C481A6AB7F1FF49320B15C46EE89ADB3A1E770E941CB50
              APIs
              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00FC180A,00000000), ref: 00FC23E1
              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00FC2418
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Internet$AvailableDataFileQueryRead
              • String ID:
              • API String ID: 599397726-0
              • Opcode ID: 109d0daec60c169e16374bcd106c7360987c6eb44861cbd3593569ac1516ffe3
              • Instruction ID: 7826e2cc10fce6779cca31317cd6848883ae9a384651297e3d1f87f96d6e9e41
              • Opcode Fuzzy Hash: 109d0daec60c169e16374bcd106c7360987c6eb44861cbd3593569ac1516ffe3
              • Instruction Fuzzy Hash: 3641F47290420AFFEB50DE95DE82FBB77ADEB40724F10406EF605A6141DA749E41B650
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 00FBB40B
              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00FBB465
              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00FBB4B2
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ErrorMode$DiskFreeSpace
              • String ID:
              • API String ID: 1682464887-0
              • Opcode ID: 35c9fa9cafd298905277eb7cacfaa331d0d737e45e6850106753fafcef77363b
              • Instruction ID: 9c01fda6161a971a5a1bf6152d7f0619ea5e152a57477a48001bd9a6792331ad
              • Opcode Fuzzy Hash: 35c9fa9cafd298905277eb7cacfaa331d0d737e45e6850106753fafcef77363b
              • Instruction Fuzzy Hash: D3214A75A00118EFCB00EFA5DC80AEDBBB8FF49315F1480AAE905AB261CB359919DF50
              APIs
                • Part of subcall function 00F70DB6: std::exception::exception.LIBCMT ref: 00F70DEC
                • Part of subcall function 00F70DB6: __CxxThrowException@8.LIBCMT ref: 00F70E01
              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00FA882B
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00FA8858
              • GetLastError.KERNEL32 ref: 00FA8865
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
              • String ID:
              • API String ID: 1922334811-0
              • Opcode ID: 8fdce949053eb61877d90ee0bc90ee7f49035223c3f88d222f9f644ad7d5c992
              • Instruction ID: 4bd98a2db33bb57b2950d68f8aae396947f32a0f13700c6ff912335f987e3e19
              • Opcode Fuzzy Hash: 8fdce949053eb61877d90ee0bc90ee7f49035223c3f88d222f9f644ad7d5c992
              • Instruction Fuzzy Hash: 4A119DB2814304AFE728EFA4DC85D2BBBE9EF05310B20852EE45683201EE74AC419B60
              APIs
              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00FA8774
              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00FA878B
              • FreeSid.ADVAPI32(?), ref: 00FA879B
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: AllocateCheckFreeInitializeMembershipToken
              • String ID:
              • API String ID: 3429775523-0
              • Opcode ID: 43a50efa0ae37721df882fee6b1ea4e91c02d692520926838532ec37841f8a5f
              • Instruction ID: 2fec283f55bc6a40253b87e51ca8d303e009ae9b64d523a861a5fad3c9a46979
              • Opcode Fuzzy Hash: 43a50efa0ae37721df882fee6b1ea4e91c02d692520926838532ec37841f8a5f
              • Instruction Fuzzy Hash: 64F03C7591120CBBDB00DFF49C89EADB7B9EF08311F504469A502E2281D6715A089B50
              APIs
              • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00FB4CB3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: mouse_event
              • String ID: DOWN
              • API String ID: 2434400541-711622031
              • Opcode ID: 60834ff747d8a426a7a6b31bc7fa2b187776f5d4db0f83c6970a7758afdb22a8
              • Instruction ID: 9ce590eb3970d7d05b321586e23f85dba0263c3175f5fd519c45b29b00725cdb
              • Opcode Fuzzy Hash: 60834ff747d8a426a7a6b31bc7fa2b187776f5d4db0f83c6970a7758afdb22a8
              • Instruction Fuzzy Hash: 66E0867619D7213CB985251AFD03EF7274C8B12731B104147F814D54C2DD442C8238BE
              APIs
              • FindFirstFileW.KERNEL32(?,?), ref: 00FBC6FB
              • FindClose.KERNEL32(00000000), ref: 00FBC72B
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Find$CloseFileFirst
              • String ID:
              • API String ID: 2295610775-0
              • Opcode ID: e51b9e839c8feae22f98d3e477214057b7ababf6ffe57a89e4a19d117197e99b
              • Instruction ID: 6c7bc20591fa69ae8d1ca33b7e01fffa614e107abc414e6055d51e5311cb5d3b
              • Opcode Fuzzy Hash: e51b9e839c8feae22f98d3e477214057b7ababf6ffe57a89e4a19d117197e99b
              • Instruction Fuzzy Hash: 7C11CE726002048FCB00EF29CC44A2AF7E9EF85321F04851EF9AACB290CB74A804DF80
              APIs
              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00FC9468,?,00FDFB84,?), ref: 00FBA097
              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00FC9468,?,00FDFB84,?), ref: 00FBA0A9
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ErrorFormatLastMessage
              • String ID:
              • API String ID: 3479602957-0
              • Opcode ID: f601af891654cea530755aa6a2f3e34433e9698fcc5468f573c6f22a5ff531a0
              • Instruction ID: 22a207ea1392527acfe799b5bc718617d767133759377d3687c6a2dae287da21
              • Opcode Fuzzy Hash: f601af891654cea530755aa6a2f3e34433e9698fcc5468f573c6f22a5ff531a0
              • Instruction Fuzzy Hash: 35F0823651522DBBDB21AFA4DC48FEA776DBF08361F004266F909D6181D6309944DBA1
              APIs
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00FA8309), ref: 00FA81E0
              • CloseHandle.KERNEL32(?,?,00FA8309), ref: 00FA81F2
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: AdjustCloseHandlePrivilegesToken
              • String ID:
              • API String ID: 81990902-0
              • Opcode ID: 004eb504bd4ee3e013e006bf89b3e5d6c5c545ff0b93352de708f03f3b6e45a9
              • Instruction ID: 8e0d4025479fbc6ddcb2e6d6f39068b098e73ea07da63d5266e4462a28118724
              • Opcode Fuzzy Hash: 004eb504bd4ee3e013e006bf89b3e5d6c5c545ff0b93352de708f03f3b6e45a9
              • Instruction Fuzzy Hash: 66E0E671011511EFE7252B74EC09D7777EAEF04350714C82EF45684470DB615C91EB50
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00F78D57,?,?,?,00000001), ref: 00F7A15A
              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00F7A163
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: e4c236976a73036ea2fa7fd9c35f9f6f6086068a17334d1ef7e281bfe733e23c
              • Instruction ID: 95c28c70508bbd9b1bfd29cb6cf8a523057104d1d82fb60620d76c13044cb355
              • Opcode Fuzzy Hash: e4c236976a73036ea2fa7fd9c35f9f6f6086068a17334d1ef7e281bfe733e23c
              • Instruction Fuzzy Hash: 25B0923105520CABCA002BA5EC09F883F6AEB44AA2F418022F60E84060CB625454AA91
              Strings
              • Variable must be of type 'Object'., xrefs: 00F93E62
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID:
              • String ID: Variable must be of type 'Object'.
              • API String ID: 0-109567571
              • Opcode ID: 5b80494db2bf9c9e3d0a1ea76bc993d281d6a06264bdc383968e25f04d70b7bb
              • Instruction ID: b6aca345f00d4d3d1da7288138ed7f58d02574c69a95302d8341c06d3395d072
              • Opcode Fuzzy Hash: 5b80494db2bf9c9e3d0a1ea76bc993d281d6a06264bdc383968e25f04d70b7bb
              • Instruction Fuzzy Hash: 92A29D75E00205CFCB28CF54C880AA9B7B2FF59321F248059EE559B351D779EE4AEB90
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fa83a8c807146abb7474eed28486ad3af3035df4609a6ab147c4c5916565e64b
              • Instruction ID: 7d7f02bcd72b4816a18c9d0e815581e65db95fce48e084e9c4c06e33866688ad
              • Opcode Fuzzy Hash: fa83a8c807146abb7474eed28486ad3af3035df4609a6ab147c4c5916565e64b
              • Instruction Fuzzy Hash: 00325622D29F454DD7239634DC72336A248AFB73D4F14C737F81AB99AAEB28C4836101
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4a5d4e88bc15539a2ab08b433a39e0e1d35bca4dc561c87e5a91f15f1dad0871
              • Instruction ID: 74f818cf6919498731d75d8513e58c14e1a18fcda76493786d40c4980bbeacb1
              • Opcode Fuzzy Hash: 4a5d4e88bc15539a2ab08b433a39e0e1d35bca4dc561c87e5a91f15f1dad0871
              • Instruction Fuzzy Hash: D8B10330D2AF844DD323A6398871336B65CAFBB2C5F52D71BFC2674D62EB2295835241
              APIs
              • __time64.LIBCMT ref: 00FB889B
                • Part of subcall function 00F7520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00FB8F6E,00000000,?,?,?,?,00FB911F,00000000,?), ref: 00F75213
                • Part of subcall function 00F7520A: __aulldiv.LIBCMT ref: 00F75233
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Time$FileSystem__aulldiv__time64
              • String ID:
              • API String ID: 2893107130-0
              • Opcode ID: b0a8c094a7f007da476c2c734748b137684aa9c9c5b3faad19dfa9616ae7e351
              • Instruction ID: 305486f579dfd534f8bfe6196ad72366fbc0d7a4f48890e055ada0f5fc651ef1
              • Opcode Fuzzy Hash: b0a8c094a7f007da476c2c734748b137684aa9c9c5b3faad19dfa9616ae7e351
              • Instruction Fuzzy Hash: F321A232A255108BC729CF25D841A92B3E5EFA5321F688E6CD0F5CB2C4CA79A905DB54
              APIs
              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00FA8389), ref: 00FA87D1
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: LogonUser
              • String ID:
              • API String ID: 1244722697-0
              • Opcode ID: cd9beda7fd302d4b76e690172490a85ee405bb097ad898b48cee2a60f316f5d1
              • Instruction ID: 445492f3f7627d141de012ee05e508b348630a9d229fd2aea926dab496e18cdd
              • Opcode Fuzzy Hash: cd9beda7fd302d4b76e690172490a85ee405bb097ad898b48cee2a60f316f5d1
              • Instruction Fuzzy Hash: 98D09E3226450EABEF019EA4DD05EAE3B6AEB04B01F408511FE16D61A1C775D935AB60
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00F7A12A
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: 0b1d1ba1c1b759f36a6154df89125ea003f925435fa7f70a895a139b326ba47b
              • Instruction ID: b740b1acaecb47c5ab8faef46be91e5fb460cc57570380620b09629ce5ab9254
              • Opcode Fuzzy Hash: 0b1d1ba1c1b759f36a6154df89125ea003f925435fa7f70a895a139b326ba47b
              • Instruction Fuzzy Hash: CFA0243000010CF7CF001F55FC04C447F5DD7001D07004031F40D40031C733541055C0
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f69bcca8ca814b5e071b676d254d500224511490c898fa470c0ca22b6af5638f
              • Instruction ID: 697dec4f6a9e9bf7fe1a9531280268a393167b308ac1776cfc90a737218d7947
              • Opcode Fuzzy Hash: f69bcca8ca814b5e071b676d254d500224511490c898fa470c0ca22b6af5638f
              • Instruction Fuzzy Hash: A9224271D04146DBDF388AA4C49477C77A1BF427A4F28822FD982CB492DB789C92FB41
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
              • Instruction ID: 2bb049c488cab6d8fd3709a038eb0e67c405c79fb40b37e4d0566881688a2e7f
              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
              • Instruction Fuzzy Hash: 73C1B7326050930ADF6D463D843513EFBA16EA27B131A876FD4BBCB1D5EE10C939E621
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
              • Instruction ID: 270bff8f696db71d889feefc0d3658bc7a8f57e9067b647bda54c123f6865106
              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
              • Instruction Fuzzy Hash: F3C1C63360509309DF6D463DC43513EBAA16EA27B131A876FD4BADB1D4EE20C939F621
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
              • Instruction ID: 10b214f452f72d848befc02a87f06c624e65a78848c529f7e371266efa7fede5
              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
              • Instruction Fuzzy Hash: A7C1843260519309DF2D463D847513EBAA16EA27B131A876FD4BACB1C4EE20C93DEA11
              APIs
              • DeleteObject.GDI32(00000000), ref: 00FC785B
              • DeleteObject.GDI32(00000000), ref: 00FC786D
              • DestroyWindow.USER32 ref: 00FC787B
              • GetDesktopWindow.USER32 ref: 00FC7895
              • GetWindowRect.USER32(00000000), ref: 00FC789C
              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00FC79DD
              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00FC79ED
              • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FC7A35
              • GetClientRect.USER32(00000000,?), ref: 00FC7A41
              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00FC7A7B
              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FC7A9D
              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FC7AB0
              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FC7ABB
              • GlobalLock.KERNEL32(00000000), ref: 00FC7AC4
              • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FC7AD3
              • GlobalUnlock.KERNEL32(00000000), ref: 00FC7ADC
              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FC7AE3
              • GlobalFree.KERNEL32(00000000), ref: 00FC7AEE
              • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FC7B00
              • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00FE2CAC,00000000), ref: 00FC7B16
              • GlobalFree.KERNEL32(00000000), ref: 00FC7B26
              • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00FC7B4C
              • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00FC7B6B
              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FC7B8D
              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00FC7D7A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
              • String ID: $AutoIt v3$DISPLAY$static
              • API String ID: 2211948467-2373415609
              • Opcode ID: 8883f05dd23c3e169221108e19a7e53c8dc48431cc3c85dfbd99bf8d72888bfb
              • Instruction ID: 15d74829f059b7448e0dfe03359b63935bad2655458105825486741655d3e34e
              • Opcode Fuzzy Hash: 8883f05dd23c3e169221108e19a7e53c8dc48431cc3c85dfbd99bf8d72888bfb
              • Instruction Fuzzy Hash: 5E029B71900219EFDB14DFA4CD89EAE7BB9EF49310F148159F906AB2A0C774AD05EF60
              APIs
              • CharUpperBuffW.USER32(?,?,00FDF910), ref: 00FD3627
              • IsWindowVisible.USER32(?), ref: 00FD364B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: BuffCharUpperVisibleWindow
              • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
              • API String ID: 4105515805-45149045
              • Opcode ID: a9f462dac856412d0872eefebc012fe1c9dcdebc3f5f9e884f0dc592e0caea19
              • Instruction ID: 344fe3bc5740e43d67e4db5ed4edd116abaaca020573c3f90a3435c404719e32
              • Opcode Fuzzy Hash: a9f462dac856412d0872eefebc012fe1c9dcdebc3f5f9e884f0dc592e0caea19
              • Instruction Fuzzy Hash: 90D1B471608301DBDA04EF10CC52A6E77A2AF85754F18445AF9865B3E3CB79DE0AEB43
              APIs
              • SetTextColor.GDI32(?,00000000), ref: 00FDA630
              • GetSysColorBrush.USER32(0000000F), ref: 00FDA661
              • GetSysColor.USER32(0000000F), ref: 00FDA66D
              • SetBkColor.GDI32(?,000000FF), ref: 00FDA687
              • SelectObject.GDI32(?,00000000), ref: 00FDA696
              • InflateRect.USER32(?,000000FF,000000FF), ref: 00FDA6C1
              • GetSysColor.USER32(00000010), ref: 00FDA6C9
              • CreateSolidBrush.GDI32(00000000), ref: 00FDA6D0
              • FrameRect.USER32(?,?,00000000), ref: 00FDA6DF
              • DeleteObject.GDI32(00000000), ref: 00FDA6E6
              • InflateRect.USER32(?,000000FE,000000FE), ref: 00FDA731
              • FillRect.USER32(?,?,00000000), ref: 00FDA763
              • GetWindowLongW.USER32(?,000000F0), ref: 00FDA78E
                • Part of subcall function 00FDA8CA: GetSysColor.USER32(00000012), ref: 00FDA903
                • Part of subcall function 00FDA8CA: SetTextColor.GDI32(?,?), ref: 00FDA907
                • Part of subcall function 00FDA8CA: GetSysColorBrush.USER32(0000000F), ref: 00FDA91D
                • Part of subcall function 00FDA8CA: GetSysColor.USER32(0000000F), ref: 00FDA928
                • Part of subcall function 00FDA8CA: GetSysColor.USER32(00000011), ref: 00FDA945
                • Part of subcall function 00FDA8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00FDA953
                • Part of subcall function 00FDA8CA: SelectObject.GDI32(?,00000000), ref: 00FDA964
                • Part of subcall function 00FDA8CA: SetBkColor.GDI32(?,00000000), ref: 00FDA96D
                • Part of subcall function 00FDA8CA: SelectObject.GDI32(?,?), ref: 00FDA97A
                • Part of subcall function 00FDA8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 00FDA999
                • Part of subcall function 00FDA8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00FDA9B0
                • Part of subcall function 00FDA8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 00FDA9C5
                • Part of subcall function 00FDA8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00FDA9ED
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
              • String ID:
              • API String ID: 3521893082-0
              • Opcode ID: a4c948f4f8f6844a04e26f6aa2e386f54669e734ace1c2fea95aa90ab0a62405
              • Instruction ID: 31070df92bbff5434e5a44ded0c655817b4b31c2bd44d85b042681a0b17c7e7f
              • Opcode Fuzzy Hash: a4c948f4f8f6844a04e26f6aa2e386f54669e734ace1c2fea95aa90ab0a62405
              • Instruction Fuzzy Hash: 82915D72409305EFC7119F64DC08E5B7BAAFF88331F184A2AF962961A0D771D948EB52
              APIs
              • DestroyWindow.USER32(?,?,?), ref: 00F52CA2
              • DeleteObject.GDI32(00000000), ref: 00F52CE8
              • DeleteObject.GDI32(00000000), ref: 00F52CF3
              • DestroyIcon.USER32(00000000,?,?,?), ref: 00F52CFE
              • DestroyWindow.USER32(00000000,?,?,?), ref: 00F52D09
              • SendMessageW.USER32(?,00001308,?,00000000), ref: 00F8C43B
              • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00F8C474
              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00F8C89D
                • Part of subcall function 00F51B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F52036,?,00000000,?,?,?,?,00F516CB,00000000,?), ref: 00F51B9A
              • SendMessageW.USER32(?,00001053), ref: 00F8C8DA
              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00F8C8F1
              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00F8C907
              • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00F8C912
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
              • String ID: 0
              • API String ID: 464785882-4108050209
              • Opcode ID: 813e971553da627d33e909cd668d0ecce51cb6e48900a02364b877105c68c796
              • Instruction ID: 51887b7bd57d983c174253b0793d3e1dcde1641fe6298f790d5738ed607206f9
              • Opcode Fuzzy Hash: 813e971553da627d33e909cd668d0ecce51cb6e48900a02364b877105c68c796
              • Instruction Fuzzy Hash: 9B129030A00201DFDB11EF24C888BA9B7E1FF05321F584679F95ACB662C731E845EBA1
              APIs
              • DestroyWindow.USER32(00000000), ref: 00FC74DE
              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00FC759D
              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00FC75DB
              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00FC75ED
              • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00FC7633
              • GetClientRect.USER32(00000000,?), ref: 00FC763F
              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00FC7683
              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00FC7692
              • GetStockObject.GDI32(00000011), ref: 00FC76A2
              • SelectObject.GDI32(00000000,00000000), ref: 00FC76A6
              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00FC76B6
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FC76BF
              • DeleteDC.GDI32(00000000), ref: 00FC76C8
              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00FC76F4
              • SendMessageW.USER32(00000030,00000000,00000001), ref: 00FC770B
              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00FC7746
              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00FC775A
              • SendMessageW.USER32(00000404,00000001,00000000), ref: 00FC776B
              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00FC779B
              • GetStockObject.GDI32(00000011), ref: 00FC77A6
              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00FC77B1
              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00FC77BB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
              • API String ID: 2910397461-517079104
              • Opcode ID: 4d720f5a8a7dd59c70097ea7c90b960f7ddd20ac99274bde37162172247fcd78
              • Instruction ID: a276f58664508ff7928e68c8c25bf88bc758abcd13ed49b799c11f02c7651f99
              • Opcode Fuzzy Hash: 4d720f5a8a7dd59c70097ea7c90b960f7ddd20ac99274bde37162172247fcd78
              • Instruction Fuzzy Hash: 36A18471A00219BFEB14DBA4DC4AFAE7BB9EB45714F044119FA15AB2E0C7B4AD04DB60
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 00FBAD1E
              • GetDriveTypeW.KERNEL32(?,00FDFAC0,?,\\.\,00FDF910), ref: 00FBADFB
              • SetErrorMode.KERNEL32(00000000,00FDFAC0,?,\\.\,00FDF910), ref: 00FBAF59
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ErrorMode$DriveType
              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
              • API String ID: 2907320926-4222207086
              • Opcode ID: 1cd443338feafafa4a5c85f674bf9dfeb3b8e5d2bce84f6bfb68fbfb93bff767
              • Instruction ID: a03c6641bc1c0b44d797c30f7673a43aee85738c7fb7639d5162bd4c8785f9c6
              • Opcode Fuzzy Hash: 1cd443338feafafa4a5c85f674bf9dfeb3b8e5d2bce84f6bfb68fbfb93bff767
              • Instruction Fuzzy Hash: D851B0B1A48705EA9B00EB13CD42DFD73A1FB09711B24806AF847AB291DA749D49FF43
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: __wcsnicmp
              • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
              • API String ID: 1038674560-86951937
              • Opcode ID: f9dcf70085e905752e3624eff6b3cac9dd046e0eb3d2ec8c5dd0b8d4aeca6930
              • Instruction ID: bbc5d8f9037f5822bf5cc2297e6998ea1765d1a1f1aae7d4429f18e13c5f79ab
              • Opcode Fuzzy Hash: f9dcf70085e905752e3624eff6b3cac9dd046e0eb3d2ec8c5dd0b8d4aeca6930
              • Instruction Fuzzy Hash: D4812BB1A00205BACB20BB60DC42FAF3B68AF15711F444026FE15AB192EB74DE49F352
              APIs
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00FD9AD2
              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00FD9B8B
              • SendMessageW.USER32(?,00001102,00000002,?), ref: 00FD9BA7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$Window
              • String ID: 0
              • API String ID: 2326795674-4108050209
              • Opcode ID: f5c67301db0f7b2a6c49613df1f5185df3e91a182bbef0824a1736bf17d6576f
              • Instruction ID: 072e76422cc728e1c8e1b7b147862d27eac6534c157edda74638b7212718c8f4
              • Opcode Fuzzy Hash: f5c67301db0f7b2a6c49613df1f5185df3e91a182bbef0824a1736bf17d6576f
              • Instruction Fuzzy Hash: F2020131508301AFD725CF64C848BAABBE6FF49320F08852EF999D63A1C7B5D944EB51
              APIs
              • GetSysColor.USER32(00000012), ref: 00FDA903
              • SetTextColor.GDI32(?,?), ref: 00FDA907
              • GetSysColorBrush.USER32(0000000F), ref: 00FDA91D
              • GetSysColor.USER32(0000000F), ref: 00FDA928
              • CreateSolidBrush.GDI32(?), ref: 00FDA92D
              • GetSysColor.USER32(00000011), ref: 00FDA945
              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00FDA953
              • SelectObject.GDI32(?,00000000), ref: 00FDA964
              • SetBkColor.GDI32(?,00000000), ref: 00FDA96D
              • SelectObject.GDI32(?,?), ref: 00FDA97A
              • InflateRect.USER32(?,000000FF,000000FF), ref: 00FDA999
              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00FDA9B0
              • GetWindowLongW.USER32(00000000,000000F0), ref: 00FDA9C5
              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00FDA9ED
              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00FDAA14
              • InflateRect.USER32(?,000000FD,000000FD), ref: 00FDAA32
              • DrawFocusRect.USER32(?,?), ref: 00FDAA3D
              • GetSysColor.USER32(00000011), ref: 00FDAA4B
              • SetTextColor.GDI32(?,00000000), ref: 00FDAA53
              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00FDAA67
              • SelectObject.GDI32(?,00FDA5FA), ref: 00FDAA7E
              • DeleteObject.GDI32(?), ref: 00FDAA89
              • SelectObject.GDI32(?,?), ref: 00FDAA8F
              • DeleteObject.GDI32(?), ref: 00FDAA94
              • SetTextColor.GDI32(?,?), ref: 00FDAA9A
              • SetBkColor.GDI32(?,?), ref: 00FDAAA4
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
              • String ID:
              • API String ID: 1996641542-0
              • Opcode ID: bf420a6f0a0259062cfa8bae45328a797d77c8dc4990ac3dfa115341c759a638
              • Instruction ID: 038281631d889aba930f20049e56d46a409d9487f5d7839edca5b72b3b91b7bf
              • Opcode Fuzzy Hash: bf420a6f0a0259062cfa8bae45328a797d77c8dc4990ac3dfa115341c759a638
              • Instruction Fuzzy Hash: 7B513F71901208FFDB119FB4DC48EAE7BBAEF08320F154226F916AB2A1D7759944EF50
              APIs
              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00FD8AC1
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00FD8AD2
              • CharNextW.USER32(0000014E), ref: 00FD8B01
              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00FD8B42
              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00FD8B58
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00FD8B69
              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00FD8B86
              • SetWindowTextW.USER32(?,0000014E), ref: 00FD8BD8
              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00FD8BEE
              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00FD8C1F
              • _memset.LIBCMT ref: 00FD8C44
              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00FD8C8D
              • _memset.LIBCMT ref: 00FD8CEC
              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00FD8D16
              • SendMessageW.USER32(?,00001074,?,00000001), ref: 00FD8D6E
              • SendMessageW.USER32(?,0000133D,?,?), ref: 00FD8E1B
              • InvalidateRect.USER32(?,00000000,00000001), ref: 00FD8E3D
              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00FD8E87
              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00FD8EB4
              • DrawMenuBar.USER32(?), ref: 00FD8EC3
              • SetWindowTextW.USER32(?,0000014E), ref: 00FD8EEB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
              • String ID: 0
              • API String ID: 1073566785-4108050209
              • Opcode ID: bcaeb63c283724da103ac517a86bed800a891877b4983797e78d0b5f3b49112b
              • Instruction ID: 7a560d722c896aee849ceec5df52eb5c91ea0296851ef1cea4930e5a1b1eca85
              • Opcode Fuzzy Hash: bcaeb63c283724da103ac517a86bed800a891877b4983797e78d0b5f3b49112b
              • Instruction Fuzzy Hash: D3E18171901209AFDB209F64CC84EEE7B7AEF05760F188157F915AB290DB748986FF60
              APIs
              • GetCursorPos.USER32(?), ref: 00FD49CA
              • GetDesktopWindow.USER32 ref: 00FD49DF
              • GetWindowRect.USER32(00000000), ref: 00FD49E6
              • GetWindowLongW.USER32(?,000000F0), ref: 00FD4A48
              • DestroyWindow.USER32(?), ref: 00FD4A74
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00FD4A9D
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FD4ABB
              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00FD4AE1
              • SendMessageW.USER32(?,00000421,?,?), ref: 00FD4AF6
              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00FD4B09
              • IsWindowVisible.USER32(?), ref: 00FD4B29
              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00FD4B44
              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00FD4B58
              • GetWindowRect.USER32(?,?), ref: 00FD4B70
              • MonitorFromPoint.USER32(?,?,00000002), ref: 00FD4B96
              • GetMonitorInfoW.USER32(00000000,?), ref: 00FD4BB0
              • CopyRect.USER32(?,?), ref: 00FD4BC7
              • SendMessageW.USER32(?,00000412,00000000), ref: 00FD4C32
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
              • String ID: ($0$tooltips_class32
              • API String ID: 698492251-4156429822
              • Opcode ID: ee5999568056232654919481f9476be8b56bdf0f999360395412930f42788e4a
              • Instruction ID: 35fc7b52e5266501970ce70697ca5eaaea98c46c3f722b0845bf3dd1465c81c0
              • Opcode Fuzzy Hash: ee5999568056232654919481f9476be8b56bdf0f999360395412930f42788e4a
              • Instruction Fuzzy Hash: 3CB1BE71608340AFDB04DF64C848B5ABBE6FF84310F04891EF99A9B2A1D775EC09EB55
              APIs
              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00FB44AC
              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00FB44D2
              • _wcscpy.LIBCMT ref: 00FB4500
              • _wcscmp.LIBCMT ref: 00FB450B
              • _wcscat.LIBCMT ref: 00FB4521
              • _wcsstr.LIBCMT ref: 00FB452C
              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00FB4548
              • _wcscat.LIBCMT ref: 00FB4591
              • _wcscat.LIBCMT ref: 00FB4598
              • _wcsncpy.LIBCMT ref: 00FB45C3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
              • API String ID: 699586101-1459072770
              • Opcode ID: 85b6c0a88b8c4a5fe9039967c1b98b8145ad45c67cc45c9a4d66fdd57fc90812
              • Instruction ID: 9d534f5293f3d2dd3348fbeca64835f8575d3b529c0a9000de847b9eb1d5029a
              • Opcode Fuzzy Hash: 85b6c0a88b8c4a5fe9039967c1b98b8145ad45c67cc45c9a4d66fdd57fc90812
              • Instruction Fuzzy Hash: 1741FA329002057BDB11AA75CC07EFF776CDF45710F08806BF909A6182EB38AA11B6A6
              APIs
              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F528BC
              • GetSystemMetrics.USER32(00000007), ref: 00F528C4
              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00F528EF
              • GetSystemMetrics.USER32(00000008), ref: 00F528F7
              • GetSystemMetrics.USER32(00000004), ref: 00F5291C
              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00F52939
              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00F52949
              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00F5297C
              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00F52990
              • GetClientRect.USER32(00000000,000000FF), ref: 00F529AE
              • GetStockObject.GDI32(00000011), ref: 00F529CA
              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00F529D5
                • Part of subcall function 00F52344: GetCursorPos.USER32(?), ref: 00F52357
                • Part of subcall function 00F52344: ScreenToClient.USER32(010157B0,?), ref: 00F52374
                • Part of subcall function 00F52344: GetAsyncKeyState.USER32(00000001), ref: 00F52399
                • Part of subcall function 00F52344: GetAsyncKeyState.USER32(00000002), ref: 00F523A7
              • SetTimer.USER32(00000000,00000000,00000028,00F51256), ref: 00F529FC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
              • String ID: AutoIt v3 GUI
              • API String ID: 1458621304-248962490
              • Opcode ID: 932a5ddaf76344e2d8e761d448bb2292372952a6453165170f8ee184f7022566
              • Instruction ID: e80d19f402ba56a0cc7e830855838e0878a56875625f97605159717f213734f9
              • Opcode Fuzzy Hash: 932a5ddaf76344e2d8e761d448bb2292372952a6453165170f8ee184f7022566
              • Instruction Fuzzy Hash: DBB15E71A0020ADFDB14DFA8DC85BAD7BB5FB49311F10422AFE16E7290DB789845EB50
              APIs
              • CharUpperBuffW.USER32(?,?), ref: 00FD3E6F
              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00FD3F2F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: BuffCharMessageSendUpper
              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
              • API String ID: 3974292440-719923060
              • Opcode ID: 60bd34803fa482cfbcf28a365908d99ad93b9b27ba8e8bfdfaca89c11e87566f
              • Instruction ID: 0ca10ea21ad5b8c28e2d5497e101fb3266b1ff23e0e35851491dff06d0f99f07
              • Opcode Fuzzy Hash: 60bd34803fa482cfbcf28a365908d99ad93b9b27ba8e8bfdfaca89c11e87566f
              • Instruction Fuzzy Hash: 98A19471604301DBDA04EF10CC56A6A73A6BF45314F18841EBD965B3D2CB74ED09EB52
              APIs
              • GetClassNameW.USER32(?,?,00000100), ref: 00FAA47A
              • __swprintf.LIBCMT ref: 00FAA51B
              • _wcscmp.LIBCMT ref: 00FAA52E
              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00FAA583
              • _wcscmp.LIBCMT ref: 00FAA5BF
              • GetClassNameW.USER32(?,?,00000400), ref: 00FAA5F6
              • GetDlgCtrlID.USER32(?), ref: 00FAA648
              • GetWindowRect.USER32(?,?), ref: 00FAA67E
              • GetParent.USER32(?), ref: 00FAA69C
              • ScreenToClient.USER32(00000000), ref: 00FAA6A3
              • GetClassNameW.USER32(?,?,00000100), ref: 00FAA71D
              • _wcscmp.LIBCMT ref: 00FAA731
              • GetWindowTextW.USER32(?,?,00000400), ref: 00FAA757
              • _wcscmp.LIBCMT ref: 00FAA76B
                • Part of subcall function 00F7362C: _iswctype.LIBCMT ref: 00F73634
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
              • String ID: %s%u
              • API String ID: 3744389584-679674701
              • Opcode ID: b2682941cf42901ab3e974a3d75759b5787dc66d35ba1753f35f51c524b7eafb
              • Instruction ID: 68aa250d74351977a82890a284ee2c946cea717d6d7dffdf6e79f7c119f4e670
              • Opcode Fuzzy Hash: b2682941cf42901ab3e974a3d75759b5787dc66d35ba1753f35f51c524b7eafb
              • Instruction Fuzzy Hash: 1CA1D2B1604706BFD715DF60C884FAAB7E8FF45320F04852AF999C2190DB34E959EB92
              APIs
              • GetClassNameW.USER32(00000008,?,00000400), ref: 00FAAF18
              • _wcscmp.LIBCMT ref: 00FAAF29
              • GetWindowTextW.USER32(00000001,?,00000400), ref: 00FAAF51
              • CharUpperBuffW.USER32(?,00000000), ref: 00FAAF6E
              • _wcscmp.LIBCMT ref: 00FAAF8C
              • _wcsstr.LIBCMT ref: 00FAAF9D
              • GetClassNameW.USER32(00000018,?,00000400), ref: 00FAAFD5
              • _wcscmp.LIBCMT ref: 00FAAFE5
              • GetWindowTextW.USER32(00000002,?,00000400), ref: 00FAB00C
              • GetClassNameW.USER32(00000018,?,00000400), ref: 00FAB055
              • _wcscmp.LIBCMT ref: 00FAB065
              • GetClassNameW.USER32(00000010,?,00000400), ref: 00FAB08D
              • GetWindowRect.USER32(00000004,?), ref: 00FAB0F6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
              • String ID: @$ThumbnailClass
              • API String ID: 1788623398-1539354611
              • Opcode ID: edc4b5ea2b7a69eb1e9a29d0186397a2b8bb72da9e87c654c5974fed1b44697f
              • Instruction ID: f26f21afa4e889050834766dd982e1ebddb6fb65d832465b71374d2251ea8c0e
              • Opcode Fuzzy Hash: edc4b5ea2b7a69eb1e9a29d0186397a2b8bb72da9e87c654c5974fed1b44697f
              • Instruction Fuzzy Hash: 3981D6B15083099FDB05DF14C885FAA7BE8FF45724F04846AFD858A092DB34DD49EB62
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: __wcsnicmp
              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
              • API String ID: 1038674560-1810252412
              • Opcode ID: 7c2dbb0228a4aa95b22ea688b2ceb1ff514f6a3687143c66411c742dca2593a0
              • Instruction ID: b8597d1cb99c117a30fb0e0f7cca51d51f8eb2b37ed31d6a95033bffe45f9de1
              • Opcode Fuzzy Hash: 7c2dbb0228a4aa95b22ea688b2ceb1ff514f6a3687143c66411c742dca2593a0
              • Instruction Fuzzy Hash: 2C31C3B1944209ABEB15FA91DD03EAE7768AF12721F20001DF982750D1EF5DAF4CF652
              APIs
              • LoadCursorW.USER32(00000000,00007F8A), ref: 00FC5013
              • LoadCursorW.USER32(00000000,00007F00), ref: 00FC501E
              • LoadCursorW.USER32(00000000,00007F03), ref: 00FC5029
              • LoadCursorW.USER32(00000000,00007F8B), ref: 00FC5034
              • LoadCursorW.USER32(00000000,00007F01), ref: 00FC503F
              • LoadCursorW.USER32(00000000,00007F81), ref: 00FC504A
              • LoadCursorW.USER32(00000000,00007F88), ref: 00FC5055
              • LoadCursorW.USER32(00000000,00007F80), ref: 00FC5060
              • LoadCursorW.USER32(00000000,00007F86), ref: 00FC506B
              • LoadCursorW.USER32(00000000,00007F83), ref: 00FC5076
              • LoadCursorW.USER32(00000000,00007F85), ref: 00FC5081
              • LoadCursorW.USER32(00000000,00007F82), ref: 00FC508C
              • LoadCursorW.USER32(00000000,00007F84), ref: 00FC5097
              • LoadCursorW.USER32(00000000,00007F04), ref: 00FC50A2
              • LoadCursorW.USER32(00000000,00007F02), ref: 00FC50AD
              • LoadCursorW.USER32(00000000,00007F89), ref: 00FC50B8
              • GetCursorInfo.USER32(?), ref: 00FC50C8
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Cursor$Load$Info
              • String ID:
              • API String ID: 2577412497-0
              • Opcode ID: def4c98f62340ff53c012dc24c6135bf8c1704823d648f9d2ffd519c1c77697a
              • Instruction ID: 1699796245340666aaa78009b1111f250baac3a8373a05eda15acfc6f2c8c055
              • Opcode Fuzzy Hash: def4c98f62340ff53c012dc24c6135bf8c1704823d648f9d2ffd519c1c77697a
              • Instruction Fuzzy Hash: 213123B1D4831A6ADF109FB68C89D5FBFE8FB04750F50452AA50DE7280DA78A5409E91
              APIs
              • _memset.LIBCMT ref: 00FDA259
              • DestroyWindow.USER32(?,?), ref: 00FDA2D3
                • Part of subcall function 00F57BCC: _memmove.LIBCMT ref: 00F57C06
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00FDA34D
              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00FDA36F
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FDA382
              • DestroyWindow.USER32(00000000), ref: 00FDA3A4
              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00F50000,00000000), ref: 00FDA3DB
              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00FDA3F4
              • GetDesktopWindow.USER32 ref: 00FDA40D
              • GetWindowRect.USER32(00000000), ref: 00FDA414
              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00FDA42C
              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00FDA444
                • Part of subcall function 00F525DB: GetWindowLongW.USER32(?,000000EB), ref: 00F525EC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
              • String ID: 0$tooltips_class32
              • API String ID: 1297703922-3619404913
              • Opcode ID: 946592bd0ac7c3d894e4d617f9aec45cd92c40c250e051fdfef8a1e0b9e92f44
              • Instruction ID: 9e56b20f67a35604bc272b76d34c8d23bc7e652d11796878809ae9f3e93d685f
              • Opcode Fuzzy Hash: 946592bd0ac7c3d894e4d617f9aec45cd92c40c250e051fdfef8a1e0b9e92f44
              • Instruction Fuzzy Hash: 8F71B071540205AFD721CF28CC49F6677E6FB89310F08451EF9859B3A0CBB5E906EB56
              APIs
                • Part of subcall function 00F52612: GetWindowLongW.USER32(?,000000EB), ref: 00F52623
              • DragQueryPoint.SHELL32(?,?), ref: 00FDC627
                • Part of subcall function 00FDAB37: ClientToScreen.USER32(?,?), ref: 00FDAB60
                • Part of subcall function 00FDAB37: GetWindowRect.USER32(?,?), ref: 00FDABD6
                • Part of subcall function 00FDAB37: PtInRect.USER32(?,?,00FDC014), ref: 00FDABE6
              • SendMessageW.USER32(?,000000B0,?,?), ref: 00FDC690
              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00FDC69B
              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00FDC6BE
              • _wcscat.LIBCMT ref: 00FDC6EE
              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00FDC705
              • SendMessageW.USER32(?,000000B0,?,?), ref: 00FDC71E
              • SendMessageW.USER32(?,000000B1,?,?), ref: 00FDC735
              • SendMessageW.USER32(?,000000B1,?,?), ref: 00FDC757
              • DragFinish.SHELL32(?), ref: 00FDC75E
              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00FDC851
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
              • API String ID: 169749273-3440237614
              • Opcode ID: 0ea54a5608878cdde2a6774b3f5c1c4358a49d75a88cec4ac3ae8cbb408a74a6
              • Instruction ID: 11ac2652a3ca47b33fbe78e2d6f238c9b10c67d35f182201c1fbcfbab59f7b81
              • Opcode Fuzzy Hash: 0ea54a5608878cdde2a6774b3f5c1c4358a49d75a88cec4ac3ae8cbb408a74a6
              • Instruction Fuzzy Hash: 65619C71108305AFC701EF64CC85D9FBBE9EF89710F00091EFA95962A1DB749A09DB92
              APIs
              • CharUpperBuffW.USER32(?,?), ref: 00FD4424
              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00FD446F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: BuffCharMessageSendUpper
              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
              • API String ID: 3974292440-4258414348
              • Opcode ID: 1a3ee254d5e176801d4da7f6777eb0cf6299844b74f6227680aa794db8b19031
              • Instruction ID: aceab1b9feb1d34919c877447e7662e4c8c3c7e825b8d6b1a966ef2c3634a36b
              • Opcode Fuzzy Hash: 1a3ee254d5e176801d4da7f6777eb0cf6299844b74f6227680aa794db8b19031
              • Instruction Fuzzy Hash: 17919F716047019FCA04EF10C851A6EB7A2AF95754F08885EFC965B3A2CB78ED49EB81
              APIs
              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00FDB8B4
              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00FD91C2), ref: 00FDB910
              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00FDB949
              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00FDB98C
              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00FDB9C3
              • FreeLibrary.KERNEL32(?), ref: 00FDB9CF
              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00FDB9DF
              • DestroyIcon.USER32(?,?,?,?,?,00FD91C2), ref: 00FDB9EE
              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00FDBA0B
              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00FDBA17
                • Part of subcall function 00F72EFD: __wcsicmp_l.LIBCMT ref: 00F72F86
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
              • String ID: .dll$.exe$.icl
              • API String ID: 1212759294-1154884017
              • Opcode ID: bb93e54f33ffa81b01be2bfcf7c8f275f8142197f565e7e662a2120f45e13602
              • Instruction ID: 0853ce1fa8224833ca75c54e8253564f0e95e227a14a3199442713bfe6a87e53
              • Opcode Fuzzy Hash: bb93e54f33ffa81b01be2bfcf7c8f275f8142197f565e7e662a2120f45e13602
              • Instruction Fuzzy Hash: 8961EE71900209FAEB14DF74CC41FBE7BA9EB08721F14851AFA15D62C1DB749A85FBA0
              APIs
              • GetLocalTime.KERNEL32(?), ref: 00FBDCDC
              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00FBDCEC
              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00FBDCF8
              • __wsplitpath.LIBCMT ref: 00FBDD56
              • _wcscat.LIBCMT ref: 00FBDD6E
              • _wcscat.LIBCMT ref: 00FBDD80
              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FBDD95
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FBDDA9
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FBDDDB
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FBDDFC
              • _wcscpy.LIBCMT ref: 00FBDE08
              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00FBDE47
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
              • String ID: *.*
              • API String ID: 3566783562-438819550
              • Opcode ID: e4705156e1a1d44964ca215b733712e36c83feef3a8be161c9b7a1a5f00719b1
              • Instruction ID: 250b392fc80368ea716458fdf0634fd3ed68c70c87854037ac2b03ba78abf913
              • Opcode Fuzzy Hash: e4705156e1a1d44964ca215b733712e36c83feef3a8be161c9b7a1a5f00719b1
              • Instruction Fuzzy Hash: E8616CB25082059FCB10EF21C844DAEB7E8FF89324F04491EF98987251EB75E949DF52
              APIs
              • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 00FB9C7F
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00FB9CA0
              • __swprintf.LIBCMT ref: 00FB9CF9
              • __swprintf.LIBCMT ref: 00FB9D12
              • _wprintf.LIBCMT ref: 00FB9DB9
              • _wprintf.LIBCMT ref: 00FB9DD7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: LoadString__swprintf_wprintf$_memmove
              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
              • API String ID: 311963372-3080491070
              • Opcode ID: 07d46d1501a17dfa09f81fbc3c9f245a7f8a4dbe5e032e0db9c614fbd98910fc
              • Instruction ID: e4e7347dd97f676ad0b8d07dd1f7fb520efe5cd1daaa49fcfb52ba94337d712b
              • Opcode Fuzzy Hash: 07d46d1501a17dfa09f81fbc3c9f245a7f8a4dbe5e032e0db9c614fbd98910fc
              • Instruction Fuzzy Hash: 6251AF72900209AACF15FBE1DD46EEEB778AF08301F104065FA0576062EB396F4CEB61
              APIs
                • Part of subcall function 00F59837: __itow.LIBCMT ref: 00F59862
                • Part of subcall function 00F59837: __swprintf.LIBCMT ref: 00F598AC
              • CharLowerBuffW.USER32(?,?), ref: 00FBA3CB
              • GetDriveTypeW.KERNEL32 ref: 00FBA418
              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FBA460
              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FBA497
              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FBA4C5
                • Part of subcall function 00F57BCC: _memmove.LIBCMT ref: 00F57C06
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
              • API String ID: 2698844021-4113822522
              • Opcode ID: aae5b4df410e43f0da167ce25fe843dbf63f4482b47aae1a0000316fa72b4a25
              • Instruction ID: 3b7a088de9d37354ee49792a79b67ddb2b403504bca627b51e9b5c6bc8644159
              • Opcode Fuzzy Hash: aae5b4df410e43f0da167ce25fe843dbf63f4482b47aae1a0000316fa72b4a25
              • Instruction Fuzzy Hash: CA5158715083059FD704EF21CC9186AB7E8FF88719F04886DF88A572A1DB75ED09DB42
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,00F8E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 00FAF8DF
              • LoadStringW.USER32(00000000,?,00F8E029,00000001), ref: 00FAF8E8
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
              • GetModuleHandleW.KERNEL32(00000000,01015310,?,00000FFF,?,?,00F8E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 00FAF90A
              • LoadStringW.USER32(00000000,?,00F8E029,00000001), ref: 00FAF90D
              • __swprintf.LIBCMT ref: 00FAF95D
              • __swprintf.LIBCMT ref: 00FAF96E
              • _wprintf.LIBCMT ref: 00FAFA17
              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00FAFA2E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
              • API String ID: 984253442-2268648507
              • Opcode ID: ca0405a4818281eed785e9a4327d78a8f16a9b63a00e1673d70711b95a36d553
              • Instruction ID: 8ed60cccbe3f7ea37be910741444fbfe7a91e276c93d1080289e0b273dcc35c4
              • Opcode Fuzzy Hash: ca0405a4818281eed785e9a4327d78a8f16a9b63a00e1673d70711b95a36d553
              • Instruction Fuzzy Hash: 844141B280020DAACF05FBE0DD96DEE7778AF15701F500065FA05B60A2EA395F0DEB61
              APIs
              • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00FD9207,?,?), ref: 00FDBA56
              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00FD9207,?,?,00000000,?), ref: 00FDBA6D
              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00FD9207,?,?,00000000,?), ref: 00FDBA78
              • CloseHandle.KERNEL32(00000000,?,?,?,?,00FD9207,?,?,00000000,?), ref: 00FDBA85
              • GlobalLock.KERNEL32(00000000), ref: 00FDBA8E
              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00FD9207,?,?,00000000,?), ref: 00FDBA9D
              • GlobalUnlock.KERNEL32(00000000), ref: 00FDBAA6
              • CloseHandle.KERNEL32(00000000,?,?,?,?,00FD9207,?,?,00000000,?), ref: 00FDBAAD
              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00FD9207,?,?,00000000,?), ref: 00FDBABE
              • OleLoadPicture.OLEAUT32(?,00000000,00000000,00FE2CAC,?), ref: 00FDBAD7
              • GlobalFree.KERNEL32(00000000), ref: 00FDBAE7
              • GetObjectW.GDI32(00000000,00000018,?), ref: 00FDBB0B
              • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00FDBB36
              • DeleteObject.GDI32(00000000), ref: 00FDBB5E
              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00FDBB74
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
              • String ID:
              • API String ID: 3840717409-0
              • Opcode ID: 6a2663d2c4a5bd36e7c28b509d7c2fd2c678a29581e2751ab05dfe762d1a6693
              • Instruction ID: 976c78726daa919bf0d669ab0ca5de2c1e627310c26e1b4f1f17445df5549307
              • Opcode Fuzzy Hash: 6a2663d2c4a5bd36e7c28b509d7c2fd2c678a29581e2751ab05dfe762d1a6693
              • Instruction Fuzzy Hash: CA414A75601208EFDB119F65DC88EAA7BBAFF89721F15406AF906D7260D7309E05EB20
              APIs
              • __wsplitpath.LIBCMT ref: 00FBDA10
              • _wcscat.LIBCMT ref: 00FBDA28
              • _wcscat.LIBCMT ref: 00FBDA3A
              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00FBDA4F
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FBDA63
              • GetFileAttributesW.KERNEL32(?), ref: 00FBDA7B
              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00FBDA95
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00FBDAA7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
              • String ID: *.*
              • API String ID: 34673085-438819550
              • Opcode ID: 707f0a57dcf630b6989ce1da6f9d55101fb2eeba4e2ced3ab64f3d2cb78ba611
              • Instruction ID: f85a868fe9f7454afdf2350f2a0ef437d697083cdbfe3da3e6df6693e1932bde
              • Opcode Fuzzy Hash: 707f0a57dcf630b6989ce1da6f9d55101fb2eeba4e2ced3ab64f3d2cb78ba611
              • Instruction Fuzzy Hash: B781A4729042459FCB24EF65C844AEAB7E8BF89354F18882EF889C7251E734D944EF53
              APIs
                • Part of subcall function 00F52612: GetWindowLongW.USER32(?,000000EB), ref: 00F52623
              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00FDC1FC
              • GetFocus.USER32 ref: 00FDC20C
              • GetDlgCtrlID.USER32(00000000), ref: 00FDC217
              • _memset.LIBCMT ref: 00FDC342
              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00FDC36D
              • GetMenuItemCount.USER32(?), ref: 00FDC38D
              • GetMenuItemID.USER32(?,00000000), ref: 00FDC3A0
              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00FDC3D4
              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00FDC41C
              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00FDC454
              • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00FDC489
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
              • String ID: 0
              • API String ID: 1296962147-4108050209
              • Opcode ID: 65433ef661bc447a2e95c301c8d45382f067561e39a0b68d710e30a3a1a3454c
              • Instruction ID: afd10532eb72302c27e68b02434ca509800d9746784276a518a034ba952bca8d
              • Opcode Fuzzy Hash: 65433ef661bc447a2e95c301c8d45382f067561e39a0b68d710e30a3a1a3454c
              • Instruction Fuzzy Hash: CA819C716083029FD710CF24D894A6ABBEAFF89724F08492FF99597391C734D905EB92
              APIs
              • GetDC.USER32(00000000), ref: 00FC738F
              • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00FC739B
              • CreateCompatibleDC.GDI32(?), ref: 00FC73A7
              • SelectObject.GDI32(00000000,?), ref: 00FC73B4
              • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00FC7408
              • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00FC7444
              • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00FC7468
              • SelectObject.GDI32(00000006,?), ref: 00FC7470
              • DeleteObject.GDI32(?), ref: 00FC7479
              • DeleteDC.GDI32(00000006), ref: 00FC7480
              • ReleaseDC.USER32(00000000,?), ref: 00FC748B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
              • String ID: (
              • API String ID: 2598888154-3887548279
              • Opcode ID: 49d1e89545bd52eb4a1fa3b89413cda307ec7278db1404a32c65d4e63b587edd
              • Instruction ID: f22ddbf82f43796734d81b75b72a86d3b37c6cc638e02c345835343dcf4f2132
              • Opcode Fuzzy Hash: 49d1e89545bd52eb4a1fa3b89413cda307ec7278db1404a32c65d4e63b587edd
              • Instruction Fuzzy Hash: B9514871904309EFCB14DFA8CC89EAEBBB9EF48310F14852EF95A97210C731A944AB50
              APIs
                • Part of subcall function 00F70957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00F56B0C,?,00008000), ref: 00F70973
                • Part of subcall function 00F54750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F54743,?,?,00F537AE,?), ref: 00F54770
              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00F56BAD
              • SetCurrentDirectoryW.KERNEL32(?), ref: 00F56CFA
                • Part of subcall function 00F5586D: _wcscpy.LIBCMT ref: 00F558A5
                • Part of subcall function 00F7363D: _iswctype.LIBCMT ref: 00F73645
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
              • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
              • API String ID: 537147316-1018226102
              • Opcode ID: eb1192438e1a74868d3abece05d742dcdef82b1a61d3fe0a2d77d8c53c4d0fec
              • Instruction ID: 326a56e0ababce8a0026b45ce8bf116e49064c80fea2f6446e1b29fc20d7b71b
              • Opcode Fuzzy Hash: eb1192438e1a74868d3abece05d742dcdef82b1a61d3fe0a2d77d8c53c4d0fec
              • Instruction Fuzzy Hash: BC02CD715083419FC720EF20C891AAFBBE5BF95315F04481EF99A972A1DB38D94DEB42
              APIs
              • _memset.LIBCMT ref: 00FB2D50
              • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00FB2DDD
              • GetMenuItemCount.USER32(01015890), ref: 00FB2E66
              • DeleteMenu.USER32(01015890,00000005,00000000,000000F5,?,?), ref: 00FB2EF6
              • DeleteMenu.USER32(01015890,00000004,00000000), ref: 00FB2EFE
              • DeleteMenu.USER32(01015890,00000006,00000000), ref: 00FB2F06
              • DeleteMenu.USER32(01015890,00000003,00000000), ref: 00FB2F0E
              • GetMenuItemCount.USER32(01015890), ref: 00FB2F16
              • SetMenuItemInfoW.USER32(01015890,00000004,00000000,00000030), ref: 00FB2F4C
              • GetCursorPos.USER32(?), ref: 00FB2F56
              • SetForegroundWindow.USER32(00000000), ref: 00FB2F5F
              • TrackPopupMenuEx.USER32(01015890,00000000,?,00000000,00000000,00000000), ref: 00FB2F72
              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00FB2F7E
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
              • String ID:
              • API String ID: 3993528054-0
              • Opcode ID: 44b2e30c16bca298a55efe613f778723e4db2227429eb9db9daf79fe6274ab60
              • Instruction ID: b7a062668adbba4c6ec2ccc109216e1ab4f47be2cfcc60472e1e5168a5e03348
              • Opcode Fuzzy Hash: 44b2e30c16bca298a55efe613f778723e4db2227429eb9db9daf79fe6274ab60
              • Instruction Fuzzy Hash: 33710431A01209BAEB619F26DC85FEABF65FF04324F140216F615AA1E0C7B59C24FF90
              APIs
                • Part of subcall function 00F57BCC: _memmove.LIBCMT ref: 00F57C06
              • _memset.LIBCMT ref: 00FA786B
              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00FA78A0
              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00FA78BC
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00FA78D8
              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00FA7902
              • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00FA792A
              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FA7935
              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00FA793A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
              • API String ID: 1411258926-22481851
              • Opcode ID: ff908033568ab9eadc9815f04cdc2f56addf6c625608818b8bbecb1110707f29
              • Instruction ID: f8f0da8b7b818a826e205a7bd67e44adff40c4af6a2c936a03544cd1bb7dc60b
              • Opcode Fuzzy Hash: ff908033568ab9eadc9815f04cdc2f56addf6c625608818b8bbecb1110707f29
              • Instruction Fuzzy Hash: 21410872C1462DABDB11EBA4EC95DEEB778BF04751F04402AE905A7161DA389E08EB90
              APIs
              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FCFDAD,?,?), ref: 00FD0E31
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: BuffCharUpper
              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
              • API String ID: 3964851224-909552448
              • Opcode ID: 4d0aaec05947c827d1c29ab664671d6ec6372550fdd4fd44b393bea14fe806f3
              • Instruction ID: 38b989be9d556442bf18ea35427005ea2b6339938527db76a61731f82dc8753b
              • Opcode Fuzzy Hash: 4d0aaec05947c827d1c29ab664671d6ec6372550fdd4fd44b393bea14fe806f3
              • Instruction Fuzzy Hash: BD41797190020A8BEF11EF10EC62BEE3765FF11714F694406FC991B292DF389919EB61
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00F8E2A0,00000010,?,Bad directive syntax error,00FDF910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00FAF7C2
              • LoadStringW.USER32(00000000,?,00F8E2A0,00000010), ref: 00FAF7C9
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
              • _wprintf.LIBCMT ref: 00FAF7FC
              • __swprintf.LIBCMT ref: 00FAF81E
              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00FAF88D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
              • API String ID: 1506413516-4153970271
              • Opcode ID: 3405e0e67c94f168a62f78b7264a0b5251ccdad0e23e00d5d78d34a8f1780bfc
              • Instruction ID: f49e34eb2b97c13e10320f4cdf590ee4791fc9169f75e300b80c4304ee3731e5
              • Opcode Fuzzy Hash: 3405e0e67c94f168a62f78b7264a0b5251ccdad0e23e00d5d78d34a8f1780bfc
              • Instruction Fuzzy Hash: 1B216F72D0021DBBCF12EF90DC5AEED7739BF18301F04446AFA156A0A2DA39961CEB51
              APIs
                • Part of subcall function 00F57BCC: _memmove.LIBCMT ref: 00F57C06
                • Part of subcall function 00F57924: _memmove.LIBCMT ref: 00F579AD
              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00FB5330
              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00FB5346
              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00FB5357
              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00FB5369
              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00FB537A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: SendString$_memmove
              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
              • API String ID: 2279737902-1007645807
              • Opcode ID: a127ec524cdebbbfe7e2143d08aaabf656f7b4621c89a09b20b391347c3674ae
              • Instruction ID: f112be1ec7df81913d70bdf5dc779c32c6c99ca68f5cfed946e5bb36b9dc026e
              • Opcode Fuzzy Hash: a127ec524cdebbbfe7e2143d08aaabf656f7b4621c89a09b20b391347c3674ae
              • Instruction Fuzzy Hash: C711B221E5022979E720B662DC4AEFF7BBCFB95F50F04042AB905A60D1EAA44D08D9B0
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
              • String ID: 0.0.0.0
              • API String ID: 208665112-3771769585
              • Opcode ID: 8fb34111cfeeccfd2211ba95550772bf2b89e441aaea6ca25db20c1ce328d34a
              • Instruction ID: 12851fce36ac8f11a41ea4b7e27441dc8bdd78d8c18f48f50fb41b0a250a1b8e
              • Opcode Fuzzy Hash: 8fb34111cfeeccfd2211ba95550772bf2b89e441aaea6ca25db20c1ce328d34a
              • Instruction Fuzzy Hash: 8B11D832900118AFDB20AB319C46EEE77BCEF01721F144177F44A96052EF759985FA52
              APIs
              • timeGetTime.WINMM ref: 00FB4F7A
                • Part of subcall function 00F7049F: timeGetTime.WINMM(?,7608B400,00F60E7B), ref: 00F704A3
              • Sleep.KERNEL32(0000000A), ref: 00FB4FA6
              • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00FB4FCA
              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00FB4FEC
              • SetActiveWindow.USER32 ref: 00FB500B
              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00FB5019
              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00FB5038
              • Sleep.KERNEL32(000000FA), ref: 00FB5043
              • IsWindow.USER32 ref: 00FB504F
              • EndDialog.USER32(00000000), ref: 00FB5060
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
              • String ID: BUTTON
              • API String ID: 1194449130-3405671355
              • Opcode ID: 3dc708d553c9d5da31e43bfe2f56a4309a813b71b52fb09e1c8dac39233966db
              • Instruction ID: a6b3465f88dc9c86caba72a492e46224895edfcf7f952f0790295d2f957117de
              • Opcode Fuzzy Hash: 3dc708d553c9d5da31e43bfe2f56a4309a813b71b52fb09e1c8dac39233966db
              • Instruction Fuzzy Hash: 7621CC71506205BFE7205F31ED85FB53B6AEB46755F041025F142821A5CB7F9D04BF61
              APIs
                • Part of subcall function 00F59837: __itow.LIBCMT ref: 00F59862
                • Part of subcall function 00F59837: __swprintf.LIBCMT ref: 00F598AC
              • CoInitialize.OLE32(00000000), ref: 00FBD5EA
              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00FBD67D
              • SHGetDesktopFolder.SHELL32(?), ref: 00FBD691
              • CoCreateInstance.OLE32(00FE2D7C,00000000,00000001,01008C1C,?), ref: 00FBD6DD
              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00FBD74C
              • CoTaskMemFree.OLE32(?,?), ref: 00FBD7A4
              • _memset.LIBCMT ref: 00FBD7E1
              • SHBrowseForFolderW.SHELL32(?), ref: 00FBD81D
              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00FBD840
              • CoTaskMemFree.OLE32(00000000), ref: 00FBD847
              • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00FBD87E
              • CoUninitialize.OLE32(00000001,00000000), ref: 00FBD880
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
              • String ID:
              • API String ID: 1246142700-0
              • Opcode ID: d8c72ba98f4701c36414a42a10acc106eb34ee9e10c0c5357bac291ed516c596
              • Instruction ID: 5661f4a195932ef2dd97fd52436a041644d3a2e584d46d7c5114a8619b14f543
              • Opcode Fuzzy Hash: d8c72ba98f4701c36414a42a10acc106eb34ee9e10c0c5357bac291ed516c596
              • Instruction Fuzzy Hash: 83B12975A00109AFDB04DFA5CC84DAEBBB9FF49314B148069E90AEB261DB30ED45DF51
              APIs
              • GetDlgItem.USER32(?,00000001), ref: 00FAC283
              • GetWindowRect.USER32(00000000,?), ref: 00FAC295
              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00FAC2F3
              • GetDlgItem.USER32(?,00000002), ref: 00FAC2FE
              • GetWindowRect.USER32(00000000,?), ref: 00FAC310
              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00FAC364
              • GetDlgItem.USER32(?,000003E9), ref: 00FAC372
              • GetWindowRect.USER32(00000000,?), ref: 00FAC383
              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00FAC3C6
              • GetDlgItem.USER32(?,000003EA), ref: 00FAC3D4
              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00FAC3F1
              • InvalidateRect.USER32(?,00000000,00000001), ref: 00FAC3FE
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$ItemMoveRect$Invalidate
              • String ID:
              • API String ID: 3096461208-0
              • Opcode ID: 465e7abe55a31e770637dc85662f1b43993af75bc71c4db221c86035d1583f41
              • Instruction ID: 9db46f34e25153a04600fe73d1fd41ddc55577ef8e18b7d8d71705146338a1be
              • Opcode Fuzzy Hash: 465e7abe55a31e770637dc85662f1b43993af75bc71c4db221c86035d1583f41
              • Instruction Fuzzy Hash: 69514FB1B00209ABDF18CFB9DD89EAEBBB6EB88310F14812DF516D7290D7709D049B50
              APIs
                • Part of subcall function 00F51B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00F52036,?,00000000,?,?,?,?,00F516CB,00000000,?), ref: 00F51B9A
              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00F520D3
              • KillTimer.USER32(-00000001,?,?,?,?,00F516CB,00000000,?,?,00F51AE2,?,?), ref: 00F5216E
              • DestroyAcceleratorTable.USER32(00000000), ref: 00F8BCA6
              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F516CB,00000000,?,?,00F51AE2,?,?), ref: 00F8BCD7
              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F516CB,00000000,?,?,00F51AE2,?,?), ref: 00F8BCEE
              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00F516CB,00000000,?,?,00F51AE2,?,?), ref: 00F8BD0A
              • DeleteObject.GDI32(00000000), ref: 00F8BD1C
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
              • String ID:
              • API String ID: 641708696-0
              • Opcode ID: 53b0a3311ddc1a456f539fae031020d07202e537dd866b74e5e1171a23a25215
              • Instruction ID: 7c393f079b59b8c786bc077b0c34c7ab1de4268509e0e45af6740dcdcc92672d
              • Opcode Fuzzy Hash: 53b0a3311ddc1a456f539fae031020d07202e537dd866b74e5e1171a23a25215
              • Instruction Fuzzy Hash: 46619432901A00DFC775AF14DD48B6677F2FF82322F104529EA825B5A4C779A859FF50
              APIs
                • Part of subcall function 00F525DB: GetWindowLongW.USER32(?,000000EB), ref: 00F525EC
              • GetSysColor.USER32(0000000F), ref: 00F521D3
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ColorLongWindow
              • String ID:
              • API String ID: 259745315-0
              • Opcode ID: 5e4052625cdc5a6f599c013b1bf6557c5058c4903a3ec531aeb991d7c2c56ad8
              • Instruction ID: 5803310dd95345ad015d438ea7f152fa6f36c70195eaa85537c72494c18eb5fe
              • Opcode Fuzzy Hash: 5e4052625cdc5a6f599c013b1bf6557c5058c4903a3ec531aeb991d7c2c56ad8
              • Instruction Fuzzy Hash: 62419F355011449FEB615F28EC88BB93B66EB07332F184366FE668A1E5C7318D46FB21
              APIs
              • CharLowerBuffW.USER32(?,?,00FDF910), ref: 00FBA90B
              • GetDriveTypeW.KERNEL32(00000061,010089A0,00000061), ref: 00FBA9D5
              • _wcscpy.LIBCMT ref: 00FBA9FF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: BuffCharDriveLowerType_wcscpy
              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
              • API String ID: 2820617543-1000479233
              • Opcode ID: 9165d83bc3f77dfbda8f86d19c5bb7cf0e3931f5be6bdaf167d5f25e9b8da337
              • Instruction ID: ee8573f786e1ca8cf58b086690a756689670d18d9814f57a8562af3c007caee2
              • Opcode Fuzzy Hash: 9165d83bc3f77dfbda8f86d19c5bb7cf0e3931f5be6bdaf167d5f25e9b8da337
              • Instruction Fuzzy Hash: 0F51CE319083019BC304EF15CC92AAFB7A9FF84710F44881EF996572A2DB78D909EE53
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: __i64tow__itow__swprintf
              • String ID: %.15g$0x%p$False$True
              • API String ID: 421087845-2263619337
              • Opcode ID: 7b8cc22ee2b05a22b925124ad6360d12ee3d78dd97f7a06fe51b81125c64e0b1
              • Instruction ID: 1bc5f3bd8a7ca7df347d4350321f82417feb6ab5002b6f647bdfc429364aeb64
              • Opcode Fuzzy Hash: 7b8cc22ee2b05a22b925124ad6360d12ee3d78dd97f7a06fe51b81125c64e0b1
              • Instruction Fuzzy Hash: BB41F872904205EFDB28EF34DC41F7A73E8FF05311F24446EE949DA241EA759909AB11
              APIs
              • _memset.LIBCMT ref: 00FD716A
              • CreateMenu.USER32 ref: 00FD7185
              • SetMenu.USER32(?,00000000), ref: 00FD7194
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FD7221
              • IsMenu.USER32(?), ref: 00FD7237
              • CreatePopupMenu.USER32 ref: 00FD7241
              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00FD726E
              • DrawMenuBar.USER32 ref: 00FD7276
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
              • String ID: 0$F
              • API String ID: 176399719-3044882817
              • Opcode ID: 840f7821d71d247e93293feede794b0472d9f96e6209241f06c7986592bffe43
              • Instruction ID: 75ad4ba2154d18d5144faf370249d8c067ae1660380b3e08415ea4026235d3e7
              • Opcode Fuzzy Hash: 840f7821d71d247e93293feede794b0472d9f96e6209241f06c7986592bffe43
              • Instruction Fuzzy Hash: ED415975A01209EFDB20EF64D844F9ABBB6FF49311F18012AF945AB351E731A914EF90
              APIs
              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00FD755E
              • CreateCompatibleDC.GDI32(00000000), ref: 00FD7565
              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00FD7578
              • SelectObject.GDI32(00000000,00000000), ref: 00FD7580
              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00FD758B
              • DeleteDC.GDI32(00000000), ref: 00FD7594
              • GetWindowLongW.USER32(?,000000EC), ref: 00FD759E
              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00FD75B2
              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00FD75BE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
              • String ID: static
              • API String ID: 2559357485-2160076837
              • Opcode ID: 268a197601c3c7d866b2db26cf6e47d2b3659945634b64cc0af8a60a51d50d71
              • Instruction ID: 27bfeb25f932ab5801119f092b12e684dbf89f734990ec64c73adf91c21b06e2
              • Opcode Fuzzy Hash: 268a197601c3c7d866b2db26cf6e47d2b3659945634b64cc0af8a60a51d50d71
              • Instruction Fuzzy Hash: 87319032505218BBDF11AF74EC08FDB3B6AFF09321F194226FA16962A0D735D815EB61
              APIs
              • _memset.LIBCMT ref: 00F76E3E
                • Part of subcall function 00F78B28: __getptd_noexit.LIBCMT ref: 00F78B28
              • __gmtime64_s.LIBCMT ref: 00F76ED7
              • __gmtime64_s.LIBCMT ref: 00F76F0D
              • __gmtime64_s.LIBCMT ref: 00F76F2A
              • __allrem.LIBCMT ref: 00F76F80
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F76F9C
              • __allrem.LIBCMT ref: 00F76FB3
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F76FD1
              • __allrem.LIBCMT ref: 00F76FE8
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F77006
              • __invoke_watson.LIBCMT ref: 00F77077
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
              • String ID:
              • API String ID: 384356119-0
              • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
              • Instruction ID: 3460f6a379e3b1258a8d20e6edf380271d17dfe9555a19f6b1084796201b4a66
              • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
              • Instruction Fuzzy Hash: CE71E776E00B17ABD714AE68DC41B9AB7A8AF04764F14C12BF518D6281F774E900A792
              APIs
              • _memset.LIBCMT ref: 00FB2542
              • GetMenuItemInfoW.USER32(01015890,000000FF,00000000,00000030), ref: 00FB25A3
              • SetMenuItemInfoW.USER32(01015890,00000004,00000000,00000030), ref: 00FB25D9
              • Sleep.KERNEL32(000001F4), ref: 00FB25EB
              • GetMenuItemCount.USER32(?), ref: 00FB262F
              • GetMenuItemID.USER32(?,00000000), ref: 00FB264B
              • GetMenuItemID.USER32(?,-00000001), ref: 00FB2675
              • GetMenuItemID.USER32(?,?), ref: 00FB26BA
              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00FB2700
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FB2714
              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FB2735
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
              • String ID:
              • API String ID: 4176008265-0
              • Opcode ID: 9a6f903d1566b5cba05533ca4c20a94a58c37fef570536031b49f501cb3685a1
              • Instruction ID: 29eb772855e84e89699e9e28ab95123de5e15e560fb8e24977faeae88cad88dd
              • Opcode Fuzzy Hash: 9a6f903d1566b5cba05533ca4c20a94a58c37fef570536031b49f501cb3685a1
              • Instruction Fuzzy Hash: DA61DF71900249AFDB61CF65DC88EFE7BBAEB46314F280459F842A7250DB35AD05EF21
              APIs
              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00FD6FA5
              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00FD6FA8
              • GetWindowLongW.USER32(?,000000F0), ref: 00FD6FCC
              • _memset.LIBCMT ref: 00FD6FDD
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00FD6FEF
              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00FD7067
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$LongWindow_memset
              • String ID:
              • API String ID: 830647256-0
              • Opcode ID: f777eecf5a45439772022d5f74ce9602b3ae29f97be947b32ff4c96ea2f9791d
              • Instruction ID: c08c1365b09acdfaf939a6f5294ce6f313f179078c860b00f862d11a5bfc7dc6
              • Opcode Fuzzy Hash: f777eecf5a45439772022d5f74ce9602b3ae29f97be947b32ff4c96ea2f9791d
              • Instruction Fuzzy Hash: 7A618A71900208AFDB21DFA8CC81EEE77B9EB09710F14415AFA14EB3A1D775AD41EB90
              APIs
              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00FA6BBF
              • SafeArrayAllocData.OLEAUT32(?), ref: 00FA6C18
              • VariantInit.OLEAUT32(?), ref: 00FA6C2A
              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00FA6C4A
              • VariantCopy.OLEAUT32(?,?), ref: 00FA6C9D
              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00FA6CB1
              • VariantClear.OLEAUT32(?), ref: 00FA6CC6
              • SafeArrayDestroyData.OLEAUT32(?), ref: 00FA6CD3
              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FA6CDC
              • VariantClear.OLEAUT32(?), ref: 00FA6CEE
              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00FA6CF9
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
              • String ID:
              • API String ID: 2706829360-0
              • Opcode ID: 028afc4f353845d15d1f9f19dc3e5808c46baafbec177f36dfc0e9b378e4673f
              • Instruction ID: dc13cea97f00f46484d2bb19fe6746241ce929e214288dc22a55a168ada0b555
              • Opcode Fuzzy Hash: 028afc4f353845d15d1f9f19dc3e5808c46baafbec177f36dfc0e9b378e4673f
              • Instruction Fuzzy Hash: 96417071A0021DDFCF00DF64DC44DAEBBB9EF09351F048069E956E7261CB34A949EBA0
              APIs
              • WSAStartup.WSOCK32(00000101,?), ref: 00FC5793
              • inet_addr.WSOCK32(?,?,?), ref: 00FC57D8
              • gethostbyname.WSOCK32(?), ref: 00FC57E4
              • IcmpCreateFile.IPHLPAPI ref: 00FC57F2
              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00FC5862
              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00FC5878
              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00FC58ED
              • WSACleanup.WSOCK32 ref: 00FC58F3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
              • String ID: Ping
              • API String ID: 1028309954-2246546115
              • Opcode ID: be56948dc0adf8c5dc2dc060f1b94c08b841345ad4fa10168d30c4a78ebf04f5
              • Instruction ID: 6ea03a9fd1aec243f8aa386de7feac076b4e72dc7ebc961d1c2c7e3cf5edfdc2
              • Opcode Fuzzy Hash: be56948dc0adf8c5dc2dc060f1b94c08b841345ad4fa10168d30c4a78ebf04f5
              • Instruction Fuzzy Hash: BC517C71A047019FDB109F24CD46F6A7BE4AF48B20F04852EF956DB2E1DB74E944EB42
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 00FBB4D0
              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00FBB546
              • GetLastError.KERNEL32 ref: 00FBB550
              • SetErrorMode.KERNEL32(00000000,READY), ref: 00FBB5BD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Error$Mode$DiskFreeLastSpace
              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
              • API String ID: 4194297153-14809454
              • Opcode ID: 13b2444dc32bde8bb1bc4a9b224f8f3b166a607a1c92f42bcfdbdfda517f78d6
              • Instruction ID: dad923b7522246c5e9f750e7fc798f83c96180b8ca7104d1d239bb136f476482
              • Opcode Fuzzy Hash: 13b2444dc32bde8bb1bc4a9b224f8f3b166a607a1c92f42bcfdbdfda517f78d6
              • Instruction Fuzzy Hash: 28318F75E00209DFDB20EB69CC45EED77B4FF05311F18402AEA019B295DBB49A05EB52
              APIs
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
                • Part of subcall function 00FAAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FAAABC
              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00FA9014
              • GetDlgCtrlID.USER32 ref: 00FA901F
              • GetParent.USER32 ref: 00FA903B
              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FA903E
              • GetDlgCtrlID.USER32(?), ref: 00FA9047
              • GetParent.USER32(?), ref: 00FA9063
              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FA9066
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$CtrlParent$ClassName_memmove
              • String ID: ComboBox$ListBox
              • API String ID: 1536045017-1403004172
              • Opcode ID: c823ea66785c46e413e18ed14733f61309ae39cb3e6f4f94be44e6defd501166
              • Instruction ID: 10c90903c380306f87bfb668e022b3a368d8621444ecd3eb1a32322985b88319
              • Opcode Fuzzy Hash: c823ea66785c46e413e18ed14733f61309ae39cb3e6f4f94be44e6defd501166
              • Instruction Fuzzy Hash: D221A7B4A00108BFDF05ABB4CC95EFEBB75EF49310F104126B952972E1DB799919EB20
              APIs
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
                • Part of subcall function 00FAAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FAAABC
              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00FA90FD
              • GetDlgCtrlID.USER32 ref: 00FA9108
              • GetParent.USER32 ref: 00FA9124
              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00FA9127
              • GetDlgCtrlID.USER32(?), ref: 00FA9130
              • GetParent.USER32(?), ref: 00FA914C
              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00FA914F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$CtrlParent$ClassName_memmove
              • String ID: ComboBox$ListBox
              • API String ID: 1536045017-1403004172
              • Opcode ID: f5677a627d7cff999a7050c131a6c007151f81bc258f3d29e6decbad7a9a9d0e
              • Instruction ID: 94465623c957472105d64e1eb2349d6e131cd0238f997ef6ecb23fc2f4e0704c
              • Opcode Fuzzy Hash: f5677a627d7cff999a7050c131a6c007151f81bc258f3d29e6decbad7a9a9d0e
              • Instruction Fuzzy Hash: 3221B6B5A00108BBDF01ABB4CC85EFEBB79EF49310F104026B951972A1DB79951DEB20
              APIs
              • GetParent.USER32 ref: 00FA916F
              • GetClassNameW.USER32(00000000,?,00000100), ref: 00FA9184
              • _wcscmp.LIBCMT ref: 00FA9196
              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00FA9211
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ClassMessageNameParentSend_wcscmp
              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
              • API String ID: 1704125052-3381328864
              • Opcode ID: 35cf385756f53dcc709eeb13293e21f01c09dbdc8fb77b69ebd3279cad6353eb
              • Instruction ID: b8e9a0bae343bd38406e8767bbd785f4a588148e3a4f93a4d7435316cee04776
              • Opcode Fuzzy Hash: 35cf385756f53dcc709eeb13293e21f01c09dbdc8fb77b69ebd3279cad6353eb
              • Instruction Fuzzy Hash: A81136B764C307BAFA122624DC0AEA737DC9F02330F20003BF904E44D1FEA569527990
              APIs
              • VariantInit.OLEAUT32(?), ref: 00FC88D7
              • CoInitialize.OLE32(00000000), ref: 00FC8904
              • CoUninitialize.OLE32 ref: 00FC890E
              • GetRunningObjectTable.OLE32(00000000,?), ref: 00FC8A0E
              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00FC8B3B
              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00FE2C0C), ref: 00FC8B6F
              • CoGetObject.OLE32(?,00000000,00FE2C0C,?), ref: 00FC8B92
              • SetErrorMode.KERNEL32(00000000), ref: 00FC8BA5
              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00FC8C25
              • VariantClear.OLEAUT32(?), ref: 00FC8C35
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
              • String ID:
              • API String ID: 2395222682-0
              • Opcode ID: 7409369f735fd3db6d0cc9179cdbdee0ef87a1396ef48c2bf15a2cf35279a76c
              • Instruction ID: 8f7021a7dc18bdab07b6d41e21fc1c49ce684cf7e33a04ad899aa85081bc6066
              • Opcode Fuzzy Hash: 7409369f735fd3db6d0cc9179cdbdee0ef87a1396ef48c2bf15a2cf35279a76c
              • Instruction Fuzzy Hash: F4C137B1608306AFC700DF24C985E2AB7E9BF89788F04491DF9869B251DB71ED06DB52
              APIs
              • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00FB7A6C
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ArraySafeVartype
              • String ID:
              • API String ID: 1725837607-0
              • Opcode ID: a978b26aa1947f5d5a459c6ab616366390b69e03b17c063b50efa673abddd9ec
              • Instruction ID: 44281a0abe82d85870eb7039496b447b5a5ff89708be09d019c9988cc2db53ee
              • Opcode Fuzzy Hash: a978b26aa1947f5d5a459c6ab616366390b69e03b17c063b50efa673abddd9ec
              • Instruction Fuzzy Hash: 57B18071A083099FDB10EFA5C884BFEBBB5EF89321F144429E501E7291D734A945EF90
              APIs
              • GetCurrentThreadId.KERNEL32 ref: 00FB11F0
              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00FB0268,?,00000001), ref: 00FB1204
              • GetWindowThreadProcessId.USER32(00000000), ref: 00FB120B
              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FB0268,?,00000001), ref: 00FB121A
              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00FB122C
              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FB0268,?,00000001), ref: 00FB1245
              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00FB0268,?,00000001), ref: 00FB1257
              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00FB0268,?,00000001), ref: 00FB129C
              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00FB0268,?,00000001), ref: 00FB12B1
              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00FB0268,?,00000001), ref: 00FB12BC
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
              • String ID:
              • API String ID: 2156557900-0
              • Opcode ID: 69e350787cc729af3e53e51f1b45460f2cbab9b65f6f340e126a474c61cff103
              • Instruction ID: 1560b5a0b0e6a1045f6997d277eb94a5f4458ffa8039f399fa70de201148becf
              • Opcode Fuzzy Hash: 69e350787cc729af3e53e51f1b45460f2cbab9b65f6f340e126a474c61cff103
              • Instruction Fuzzy Hash: CF31E679A01208FFDB309F65DC54FAA37AAFB55321F904129FD01C6191D7BA9D40AF50
              APIs
              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00F5FAA6
              • OleUninitialize.OLE32(?,00000000), ref: 00F5FB45
              • UnregisterHotKey.USER32(?), ref: 00F5FC9C
              • DestroyWindow.USER32(?), ref: 00F945D6
              • FreeLibrary.KERNEL32(?), ref: 00F9463B
              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F94668
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
              • String ID: close all
              • API String ID: 469580280-3243417748
              • Opcode ID: efbec5e1bf560cfb941d79b0d8ae93d4beda8b868473a49bb7b06a8bc6f7c241
              • Instruction ID: 958291b8ae171bb7cafc3451acd3fc40b6cc3a6044178bb23d4fd9c366dbe154
              • Opcode Fuzzy Hash: efbec5e1bf560cfb941d79b0d8ae93d4beda8b868473a49bb7b06a8bc6f7c241
              • Instruction Fuzzy Hash: 30A1AC71701212CFDB29EF14C994E69F364BF15711F1442ADEA0AAB262CB34ED1AEF50
              APIs
              • EnumChildWindows.USER32(?,00FAA439), ref: 00FAA377
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ChildEnumWindows
              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
              • API String ID: 3555792229-1603158881
              • Opcode ID: 1cc697158a30a513d9617ab1699e3a9ab91eacf557e4f11a6e87ccc2f3017591
              • Instruction ID: bc3a668ccbf1cab8e869178d25169d06d05624310adbce37963b1722283831fc
              • Opcode Fuzzy Hash: 1cc697158a30a513d9617ab1699e3a9ab91eacf557e4f11a6e87ccc2f3017591
              • Instruction Fuzzy Hash: F291E971900606EADB09EFA0C842BEDFBB4BF05310F54C11AD899A3191DF35695DFBA1
              APIs
              • SetWindowLongW.USER32(?,000000EB), ref: 00F52EAE
                • Part of subcall function 00F51DB3: GetClientRect.USER32(?,?), ref: 00F51DDC
                • Part of subcall function 00F51DB3: GetWindowRect.USER32(?,?), ref: 00F51E1D
                • Part of subcall function 00F51DB3: ScreenToClient.USER32(?,?), ref: 00F51E45
              • GetDC.USER32 ref: 00F8CD32
              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00F8CD45
              • SelectObject.GDI32(00000000,00000000), ref: 00F8CD53
              • SelectObject.GDI32(00000000,00000000), ref: 00F8CD68
              • ReleaseDC.USER32(?,00000000), ref: 00F8CD70
              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00F8CDFB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
              • String ID: U
              • API String ID: 4009187628-3372436214
              • Opcode ID: 2581f490ec4078978eab4b778b14b0521419a7566e026fa0ee8d050a8422db89
              • Instruction ID: 86710494d9b4f0ccee280a1b880580ae49e6bf5106647dc66270c3bfc2239965
              • Opcode Fuzzy Hash: 2581f490ec4078978eab4b778b14b0521419a7566e026fa0ee8d050a8422db89
              • Instruction Fuzzy Hash: 7271D532800205DFCF21AF64CC85AEA7BB5FF49321F14426AEE555A296C7359C45FBA0
              APIs
              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00FC1A50
              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00FC1A7C
              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00FC1ABE
              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00FC1AD3
              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00FC1AE0
              • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00FC1B10
              • InternetCloseHandle.WININET(00000000), ref: 00FC1B57
                • Part of subcall function 00FC2483: GetLastError.KERNEL32(?,?,00FC1817,00000000,00000000,00000001), ref: 00FC2498
                • Part of subcall function 00FC2483: SetEvent.KERNEL32(?,?,00FC1817,00000000,00000000,00000001), ref: 00FC24AD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
              • String ID:
              • API String ID: 2603140658-3916222277
              • Opcode ID: 578adaff018465a7c2ab8500c7d2f78dd85bd40bc2cb8eacba8ef5ebc49e010a
              • Instruction ID: 988fcb2064cee65b940fb25be27dff2d52bdc9f44ff183ef8fac4bb9a7275e66
              • Opcode Fuzzy Hash: 578adaff018465a7c2ab8500c7d2f78dd85bd40bc2cb8eacba8ef5ebc49e010a
              • Instruction Fuzzy Hash: DF4192B190120ABFEB119F60CD86FFA7BADFF49350F04411AF9059A142E7749E54ABA0
              APIs
              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00FDF910), ref: 00FC8D28
              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00FDF910), ref: 00FC8D5C
              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00FC8ED6
              • SysFreeString.OLEAUT32(?), ref: 00FC8F00
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Free$FileLibraryModuleNamePathQueryStringType
              • String ID:
              • API String ID: 560350794-0
              • Opcode ID: c2f4cb01b4a400d5dcc826e700c7bda9e91db885974fe0667625094ff7e04b97
              • Instruction ID: 1ff71d1e6e45cefd007f769c8bfb3336c0a4187205034699e663d715b937ebba
              • Opcode Fuzzy Hash: c2f4cb01b4a400d5dcc826e700c7bda9e91db885974fe0667625094ff7e04b97
              • Instruction Fuzzy Hash: D1F15B71A0010AEFCB04DFA4C989EAEB7B9FF45354F108458F906AB251DB71AE46EB50
              APIs
              • _memset.LIBCMT ref: 00FCF6B5
              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00FCF848
              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00FCF86C
              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00FCF8AC
              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00FCF8CE
              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00FCFA4A
              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00FCFA7C
              • CloseHandle.KERNEL32(?), ref: 00FCFAAB
              • CloseHandle.KERNEL32(?), ref: 00FCFB22
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
              • String ID:
              • API String ID: 4090791747-0
              • Opcode ID: 1956b565301a49d2e98b82803f5522777cabfd11aad9dfb0bfdca26d79c4ce24
              • Instruction ID: c2ba555f324d63a50c65fa0111759aec1521a8a6c7751b0e6ee7e2bd2f678ae0
              • Opcode Fuzzy Hash: 1956b565301a49d2e98b82803f5522777cabfd11aad9dfb0bfdca26d79c4ce24
              • Instruction Fuzzy Hash: 46E1C431604301DFCB14EF24C982F6ABBE1AF85354F18846DF8998B2A1CB34DC49EB52
              APIs
                • Part of subcall function 00FB466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FB3697,?), ref: 00FB468B
                • Part of subcall function 00FB466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FB3697,?), ref: 00FB46A4
                • Part of subcall function 00FB4A31: GetFileAttributesW.KERNEL32(?,00FB370B), ref: 00FB4A32
              • lstrcmpiW.KERNEL32(?,?), ref: 00FB4D40
              • _wcscmp.LIBCMT ref: 00FB4D5A
              • MoveFileW.KERNEL32(?,?), ref: 00FB4D75
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
              • String ID:
              • API String ID: 793581249-0
              • Opcode ID: 88f62eb457fc64fbb7456106cacdb5cd0233b219377126d8128ff3b7663cbb6a
              • Instruction ID: 1177ecc3214a8c8e37bb5cd54260e168833ca661ad5d52f41346d96af9778874
              • Opcode Fuzzy Hash: 88f62eb457fc64fbb7456106cacdb5cd0233b219377126d8128ff3b7663cbb6a
              • Instruction Fuzzy Hash: D05152B24083459BC724EB60DD919DBB3ECAF84310F00492FB689D3152EE38B688DB56
              APIs
              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00FD86FF
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: InvalidateRect
              • String ID:
              • API String ID: 634782764-0
              • Opcode ID: ede19318ab0dd14f6855f7dc0fbff5e7b7a05777c958ca533fa2c81031c406f7
              • Instruction ID: 78731df7791dbf808781c922b37ea9906ae508b3e951ab86082ccdbe0011e4b5
              • Opcode Fuzzy Hash: ede19318ab0dd14f6855f7dc0fbff5e7b7a05777c958ca533fa2c81031c406f7
              • Instruction Fuzzy Hash: 71519231900244BEEB209B28CC85FAD3B66AB053A0F684253F951E63A1CF75ED46FB51
              APIs
              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00F8C2F7
              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00F8C319
              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00F8C331
              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00F8C34F
              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00F8C370
              • DestroyIcon.USER32(00000000), ref: 00F8C37F
              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00F8C39C
              • DestroyIcon.USER32(?), ref: 00F8C3AB
                • Part of subcall function 00FDA4AF: DeleteObject.GDI32(00000000), ref: 00FDA4E8
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
              • String ID:
              • API String ID: 2819616528-0
              • Opcode ID: 7f278fc9ac0084cc2c7e5f11dab2273d5499f96d4e22090fd3048335ae0df7ad
              • Instruction ID: 177a4330f2680f7a2d5ff0368622a3c1cacdce088ae10e6564160e4f519fd126
              • Opcode Fuzzy Hash: 7f278fc9ac0084cc2c7e5f11dab2273d5499f96d4e22090fd3048335ae0df7ad
              • Instruction Fuzzy Hash: 21516C71A00209EFDB24EF64CC45FAA3BB5EB45321F104629FE42A7290D774ED55EBA0
              APIs
                • Part of subcall function 00FAA82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00FAA84C
                • Part of subcall function 00FAA82C: GetCurrentThreadId.KERNEL32 ref: 00FAA853
                • Part of subcall function 00FAA82C: AttachThreadInput.USER32(00000000,?,00FA9683,?,00000001), ref: 00FAA85A
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FA968E
              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00FA96AB
              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00FA96AE
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FA96B7
              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00FA96D5
              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00FA96D8
              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00FA96E1
              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00FA96F8
              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00FA96FB
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
              • String ID:
              • API String ID: 2014098862-0
              • Opcode ID: e2d426d8514d6b2a94e1e1b5238660d42b400c370b2c0f7a0a3517ac722ed401
              • Instruction ID: 7598cdc1cc6e1ca3873b4b7a282a77577d743215c8473a064a3d493e88917597
              • Opcode Fuzzy Hash: e2d426d8514d6b2a94e1e1b5238660d42b400c370b2c0f7a0a3517ac722ed401
              • Instruction Fuzzy Hash: B011E1B1910218FEF6106F70DC89F6A3B2EEB4D750F100426F245AB1A1CAF25C14EAA4
              APIs
              • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00FA853C,00000B00,?,?), ref: 00FA892A
              • HeapAlloc.KERNEL32(00000000,?,00FA853C,00000B00,?,?), ref: 00FA8931
              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00FA853C,00000B00,?,?), ref: 00FA8946
              • GetCurrentProcess.KERNEL32(?,00000000,?,00FA853C,00000B00,?,?), ref: 00FA894E
              • DuplicateHandle.KERNEL32(00000000,?,00FA853C,00000B00,?,?), ref: 00FA8951
              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00FA853C,00000B00,?,?), ref: 00FA8961
              • GetCurrentProcess.KERNEL32(00FA853C,00000000,?,00FA853C,00000B00,?,?), ref: 00FA8969
              • DuplicateHandle.KERNEL32(00000000,?,00FA853C,00000B00,?,?), ref: 00FA896C
              • CreateThread.KERNEL32(00000000,00000000,00FA8992,00000000,00000000,00000000), ref: 00FA8986
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
              • String ID:
              • API String ID: 1957940570-0
              • Opcode ID: 3e3821fc83604b405da8f3516b028e19b8b088a8c3ee1001717c9316afcc07b2
              • Instruction ID: 618908596f15a99f94ff1248c39f0f1755cc6509d2e2312559d5906eaca1d149
              • Opcode Fuzzy Hash: 3e3821fc83604b405da8f3516b028e19b8b088a8c3ee1001717c9316afcc07b2
              • Instruction Fuzzy Hash: C501BBB5241348FFE710ABB5DC4DF6B3BADEB89711F408421FA05DB1A1CA709804DB21
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID:
              • String ID: NULL Pointer assignment$Not an Object type
              • API String ID: 0-572801152
              • Opcode ID: c825aaf8862b1d4bfbe8f65d743138bb651ff547cd2ef6d21cc85d8634932e1c
              • Instruction ID: 165f8011e5d4b8a0f590d7613c71664979181c1ae6c3c3885acb03b1b521f257
              • Opcode Fuzzy Hash: c825aaf8862b1d4bfbe8f65d743138bb651ff547cd2ef6d21cc85d8634932e1c
              • Instruction Fuzzy Hash: B9C1A271E0420B9BDF10DF68C989FAEB7F5BB58314F14846DE905A7280E7B09D44DB60
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Variant$ClearInit$_memset
              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
              • API String ID: 2862541840-625585964
              • Opcode ID: 8ee79cc21d1c2a54f9a6111124da3a6ee19fcf776c0c1a0630ff18117d0f7a10
              • Instruction ID: 7ff9784d96668bb327b2274599a9e112c95fc10a8b253e87a2cf89e990e198aa
              • Opcode Fuzzy Hash: 8ee79cc21d1c2a54f9a6111124da3a6ee19fcf776c0c1a0630ff18117d0f7a10
              • Instruction Fuzzy Hash: 96917E71E0421AEBDF24CFA5CD49FAEB7B8EF45720F10815EE515AB280D7B09905DBA0
              APIs
                • Part of subcall function 00FA710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FA7044,80070057,?,?,?,00FA7455), ref: 00FA7127
                • Part of subcall function 00FA710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FA7044,80070057,?,?), ref: 00FA7142
                • Part of subcall function 00FA710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FA7044,80070057,?,?), ref: 00FA7150
                • Part of subcall function 00FA710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FA7044,80070057,?), ref: 00FA7160
              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00FC9806
              • _memset.LIBCMT ref: 00FC9813
              • _memset.LIBCMT ref: 00FC9956
              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00FC9982
              • CoTaskMemFree.OLE32(?), ref: 00FC998D
              Strings
              • NULL Pointer assignment, xrefs: 00FC99DB
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
              • String ID: NULL Pointer assignment
              • API String ID: 1300414916-2785691316
              • Opcode ID: a072833e3905591a0b333e40f8e378098bfd5a70531648979322a9604b1d84b4
              • Instruction ID: 738df9665e7dfb0371fc8e90f35c912d6af66ef27df5aca47efd421ffb8ffcb4
              • Opcode Fuzzy Hash: a072833e3905591a0b333e40f8e378098bfd5a70531648979322a9604b1d84b4
              • Instruction Fuzzy Hash: 47916871D00229EBCB10DFA5DC85EDEBBB9AF08710F20401AF519A7291DB759A08DFA0
              APIs
              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00FD6E24
              • SendMessageW.USER32(?,00001036,00000000,?), ref: 00FD6E38
              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00FD6E52
              • _wcscat.LIBCMT ref: 00FD6EAD
              • SendMessageW.USER32(?,00001057,00000000,?), ref: 00FD6EC4
              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00FD6EF2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$Window_wcscat
              • String ID: SysListView32
              • API String ID: 307300125-78025650
              • Opcode ID: 6552390459e3f1cf8de3d83d5d52c9a97c9cd80bd9306a20ea0b5ef86f6daf68
              • Instruction ID: fd18fd862ab29b8daf27e7e402dd677746317845f8435334b6ed739326c42e51
              • Opcode Fuzzy Hash: 6552390459e3f1cf8de3d83d5d52c9a97c9cd80bd9306a20ea0b5ef86f6daf68
              • Instruction Fuzzy Hash: F941C171A00308ABEB21DF64CC85FEE77AAEF08360F14442BF585E7291D6759D849B60
              APIs
                • Part of subcall function 00FB3C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00FB3C7A
                • Part of subcall function 00FB3C55: Process32FirstW.KERNEL32(00000000,?), ref: 00FB3C88
                • Part of subcall function 00FB3C55: CloseHandle.KERNEL32(00000000), ref: 00FB3D52
              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00FCE9A4
              • GetLastError.KERNEL32 ref: 00FCE9B7
              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00FCE9E6
              • TerminateProcess.KERNEL32(00000000,00000000), ref: 00FCEA63
              • GetLastError.KERNEL32(00000000), ref: 00FCEA6E
              • CloseHandle.KERNEL32(00000000), ref: 00FCEAA3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
              • String ID: SeDebugPrivilege
              • API String ID: 2533919879-2896544425
              • Opcode ID: a6a64b793a469934ff3b66da25d8c873786dd875907c6516e2cc01c36aa3f159
              • Instruction ID: 3e16a44dc9737ad336c71a6788761c568e53ff4abf0341bb6e5c66dab6ce6c92
              • Opcode Fuzzy Hash: a6a64b793a469934ff3b66da25d8c873786dd875907c6516e2cc01c36aa3f159
              • Instruction Fuzzy Hash: 4141CD716002019FDB14EF24CD96F6EB7A5AF41314F18841DFA069F2C2CBB9A908EF91
              APIs
              • LoadIconW.USER32(00000000,00007F03), ref: 00FB3033
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: IconLoad
              • String ID: blank$info$question$stop$warning
              • API String ID: 2457776203-404129466
              • Opcode ID: e291c93245d86d34ab422214472ec1cfdc6cd005bde4247febeacfa7300d5898
              • Instruction ID: 91a8a08188aad5e39450c16ce52fb079713e35f97195e47d2107560ebb957d81
              • Opcode Fuzzy Hash: e291c93245d86d34ab422214472ec1cfdc6cd005bde4247febeacfa7300d5898
              • Instruction Fuzzy Hash: 9F115B32B8C346BEE715AA16DC82DEB779C9F193B4F10402BF904A6181DB756F0079A5
              APIs
              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00FB4312
              • LoadStringW.USER32(00000000), ref: 00FB4319
              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00FB432F
              • LoadStringW.USER32(00000000), ref: 00FB4336
              • _wprintf.LIBCMT ref: 00FB435C
              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00FB437A
              Strings
              • %s (%d) : ==> %s: %s %s, xrefs: 00FB4357
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: HandleLoadModuleString$Message_wprintf
              • String ID: %s (%d) : ==> %s: %s %s
              • API String ID: 3648134473-3128320259
              • Opcode ID: d2ccc4d145add426b7a9288cd7c808be3ca0ba765160387c0aea6de96d8effd0
              • Instruction ID: 690b1a5f7074bb7b010d02ae0c4ddd2c2d490a61cb8fc9db6a35d798205bf94a
              • Opcode Fuzzy Hash: d2ccc4d145add426b7a9288cd7c808be3ca0ba765160387c0aea6de96d8effd0
              • Instruction Fuzzy Hash: 3B01A2F380020CBFE71197A0DD89EE6736CEB08300F4040A2B74AE2011EA349E886B71
              APIs
                • Part of subcall function 00F52612: GetWindowLongW.USER32(?,000000EB), ref: 00F52623
              • GetSystemMetrics.USER32(0000000F), ref: 00FDD47C
              • GetSystemMetrics.USER32(0000000F), ref: 00FDD49C
              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00FDD6D7
              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00FDD6F5
              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00FDD716
              • ShowWindow.USER32(00000003,00000000), ref: 00FDD735
              • InvalidateRect.USER32(?,00000000,00000001), ref: 00FDD75A
              • DefDlgProcW.USER32(?,00000005,?,?), ref: 00FDD77D
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
              • String ID:
              • API String ID: 1211466189-0
              • Opcode ID: db0f3faa0a6dc7eaac59d7babeb6b41066610605bdd6540dabe668b86e437651
              • Instruction ID: c6562f9a8052946d45ec033fd48c7e64a49d803b838f30b4520f7fe571c4ccb4
              • Opcode Fuzzy Hash: db0f3faa0a6dc7eaac59d7babeb6b41066610605bdd6540dabe668b86e437651
              • Instruction Fuzzy Hash: F4B18B75A00219EFDF14CF68C985BAD7BB2BF04711F0880AAEC489F295D734A950EB90
              APIs
              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00F8C1C7,00000004,00000000,00000000,00000000), ref: 00F52ACF
              • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00F8C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00F52B17
              • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00F8C1C7,00000004,00000000,00000000,00000000), ref: 00F8C21A
              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00F8C1C7,00000004,00000000,00000000,00000000), ref: 00F8C286
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ShowWindow
              • String ID:
              • API String ID: 1268545403-0
              • Opcode ID: 4593f5de1ac9f13819c3f41b42725fc1630a386dd41c9975592a55811d2ec254
              • Instruction ID: 6001b8ff8b2620b9aab5c905413a012a10bec0ed188ab148ca46aea77d2a2471
              • Opcode Fuzzy Hash: 4593f5de1ac9f13819c3f41b42725fc1630a386dd41c9975592a55811d2ec254
              • Instruction Fuzzy Hash: DE410231A046809AC7B56B38CCCCB6B7B92BB87321F14861DEA4786561C67D984DF760
              APIs
              • InterlockedExchange.KERNEL32(?,000001F5), ref: 00FB70DD
                • Part of subcall function 00F70DB6: std::exception::exception.LIBCMT ref: 00F70DEC
                • Part of subcall function 00F70DB6: __CxxThrowException@8.LIBCMT ref: 00F70E01
              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00FB7114
              • EnterCriticalSection.KERNEL32(?), ref: 00FB7130
              • _memmove.LIBCMT ref: 00FB717E
              • _memmove.LIBCMT ref: 00FB719B
              • LeaveCriticalSection.KERNEL32(?), ref: 00FB71AA
              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00FB71BF
              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FB71DE
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
              • String ID:
              • API String ID: 256516436-0
              • Opcode ID: 0425b0170cd1b98612a59c124a636ad0b42879b5cf76e6e79c83ac8b8faf7130
              • Instruction ID: a679117661bface7ff0c99f6c2c32081397964acf3175d47ff9c8bb767afde1a
              • Opcode Fuzzy Hash: 0425b0170cd1b98612a59c124a636ad0b42879b5cf76e6e79c83ac8b8faf7130
              • Instruction Fuzzy Hash: 29316F31900205EBCF10EFA5DC85EAEB779EF45710F1481B6F909AB246DB349E14EBA1
              APIs
              • DeleteObject.GDI32(00000000), ref: 00FD61EB
              • GetDC.USER32(00000000), ref: 00FD61F3
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FD61FE
              • ReleaseDC.USER32(00000000,00000000), ref: 00FD620A
              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00FD6246
              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00FD6257
              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00FD902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00FD6291
              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00FD62B1
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
              • String ID:
              • API String ID: 3864802216-0
              • Opcode ID: 986d0aef92637260ececf1ae1f7ab003d136429855a131313eea7d4ae1600f7a
              • Instruction ID: 908092085e623e9af4b2d2c491036897fa527d3f1491ebc540bf61369a2c2ea2
              • Opcode Fuzzy Hash: 986d0aef92637260ececf1ae1f7ab003d136429855a131313eea7d4ae1600f7a
              • Instruction Fuzzy Hash: 62317F72101214BFEF118F64CC8AFEA3BAAEF49765F084066FE09DA291C6759C41DB60
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _memcmp
              • String ID:
              • API String ID: 2931989736-0
              • Opcode ID: f3ea45b8f0afbaab5b7e4e0acf23b5ef82bbfd1b45750da90ae2ee292154cfe2
              • Instruction ID: 8985b1c2d3f857dea12d8940a91eea02fe21606a184be9eb4752f4b466609c4f
              • Opcode Fuzzy Hash: f3ea45b8f0afbaab5b7e4e0acf23b5ef82bbfd1b45750da90ae2ee292154cfe2
              • Instruction Fuzzy Hash: 2121DAF26012057BA314AA159D42FBB735DAE533A8F044011FD0856643FB18DE25B1B2
              APIs
                • Part of subcall function 00F59837: __itow.LIBCMT ref: 00F59862
                • Part of subcall function 00F59837: __swprintf.LIBCMT ref: 00F598AC
                • Part of subcall function 00F6FC86: _wcscpy.LIBCMT ref: 00F6FCA9
              • _wcstok.LIBCMT ref: 00FBEC94
              • _wcscpy.LIBCMT ref: 00FBED23
              • _memset.LIBCMT ref: 00FBED56
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
              • String ID: X
              • API String ID: 774024439-3081909835
              • Opcode ID: 2d7a1b7b3adc5cc9f371efaab3dab8eb88af3fb361f877b302a1007a5da51683
              • Instruction ID: 3f1c580325c97a3a5ef460a94419c8d25d2eee9a8c45eeeb428210dfa45b62e2
              • Opcode Fuzzy Hash: 2d7a1b7b3adc5cc9f371efaab3dab8eb88af3fb361f877b302a1007a5da51683
              • Instruction Fuzzy Hash: 05C19F71908701DFC714EF24D841AAAB7E0BF85311F14492DF9999B2A2DB74EC49EF82
              APIs
              • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00FC6C00
              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00FC6C21
              • WSAGetLastError.WSOCK32(00000000), ref: 00FC6C34
              • htons.WSOCK32(?,?,?,00000000,?), ref: 00FC6CEA
              • inet_ntoa.WSOCK32(?), ref: 00FC6CA7
                • Part of subcall function 00FAA7E9: _strlen.LIBCMT ref: 00FAA7F3
                • Part of subcall function 00FAA7E9: _memmove.LIBCMT ref: 00FAA815
              • _strlen.LIBCMT ref: 00FC6D44
              • _memmove.LIBCMT ref: 00FC6DAD
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
              • String ID:
              • API String ID: 3619996494-0
              • Opcode ID: 6b63cc197b23751c1d14367ee6fdf3ba1d25aca237d5f38d4bb86f04302ac864
              • Instruction ID: 3975a13d7dd5c39f83c32a3d368ebacee13e8306002b72e69b5bcb8d54491af8
              • Opcode Fuzzy Hash: 6b63cc197b23751c1d14367ee6fdf3ba1d25aca237d5f38d4bb86f04302ac864
              • Instruction Fuzzy Hash: 4281F571608301ABC714EB24CC82F6BB7E8AF84714F14491DFA46DB2A2DB74DD09EB52
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0e5425dc0d24af09986a6dec26b20adb8902f8aefb411d6d9e63baae856e227c
              • Instruction ID: aacbdd70172452c132012ab58622e023cf4ff6bbc2ab067b8f22da6f4af01011
              • Opcode Fuzzy Hash: 0e5425dc0d24af09986a6dec26b20adb8902f8aefb411d6d9e63baae856e227c
              • Instruction Fuzzy Hash: 91717D31900109EFCB14DF58CC49FBEBB75FF86321F248259FA15AA251C734AA15EBA0
              APIs
              • IsWindow.USER32(011744F0), ref: 00FDB3EB
              • IsWindowEnabled.USER32(011744F0), ref: 00FDB3F7
              • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00FDB4DB
              • SendMessageW.USER32(011744F0,000000B0,?,?), ref: 00FDB512
              • IsDlgButtonChecked.USER32(?,?), ref: 00FDB54F
              • GetWindowLongW.USER32(011744F0,000000EC), ref: 00FDB571
              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00FDB589
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
              • String ID:
              • API String ID: 4072528602-0
              • Opcode ID: 96f30165ae6710b0279b1288a23a37d2367a5ade32f3354dc3921b89091805f9
              • Instruction ID: 3139a2889e0382961a0ce35a717b2de84c26aeb544f840932cdfe12804a594a7
              • Opcode Fuzzy Hash: 96f30165ae6710b0279b1288a23a37d2367a5ade32f3354dc3921b89091805f9
              • Instruction Fuzzy Hash: 4B719234A05204EFDB21DF64C894FBA77B6FF4A320F19405AE946973A2C736A940FB50
              APIs
              • _memset.LIBCMT ref: 00FCF448
              • _memset.LIBCMT ref: 00FCF511
              • ShellExecuteExW.SHELL32(?), ref: 00FCF556
                • Part of subcall function 00F59837: __itow.LIBCMT ref: 00F59862
                • Part of subcall function 00F59837: __swprintf.LIBCMT ref: 00F598AC
                • Part of subcall function 00F6FC86: _wcscpy.LIBCMT ref: 00F6FCA9
              • GetProcessId.KERNEL32(00000000), ref: 00FCF5CD
              • CloseHandle.KERNEL32(00000000), ref: 00FCF5FC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
              • String ID: @
              • API String ID: 3522835683-2766056989
              • Opcode ID: 2193928886c7ae492961cc0e9a80afa788e397106b6aa25de2b4916085d67aa5
              • Instruction ID: 3e49e8ea31e2272780cfb9db8f7e22526cf398f6aed366bef12d6a83c857d386
              • Opcode Fuzzy Hash: 2193928886c7ae492961cc0e9a80afa788e397106b6aa25de2b4916085d67aa5
              • Instruction Fuzzy Hash: 7461AE71A00619DFCB14DF64C981AAEFBB5FF49310F18806DE919AB351CB34AD49EB80
              APIs
              • GetParent.USER32(?), ref: 00FB0F8C
              • GetKeyboardState.USER32(?), ref: 00FB0FA1
              • SetKeyboardState.USER32(?), ref: 00FB1002
              • PostMessageW.USER32(?,00000101,00000010,?), ref: 00FB1030
              • PostMessageW.USER32(?,00000101,00000011,?), ref: 00FB104F
              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00FB1095
              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00FB10B8
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessagePost$KeyboardState$Parent
              • String ID:
              • API String ID: 87235514-0
              • Opcode ID: 9e6669713879b7b8ce04953b8f60c861b33753446f1fd10da8b71c804bd5325b
              • Instruction ID: 5d3ec54e96c1108fecc15f82f296b38c760c2fe99cebb37228f97dd239d9aad2
              • Opcode Fuzzy Hash: 9e6669713879b7b8ce04953b8f60c861b33753446f1fd10da8b71c804bd5325b
              • Instruction Fuzzy Hash: F15103A0A047D53DFB3252398C25BF7BEA96B06350F488589E1D5468C2C698DCC8FB51
              APIs
              • GetParent.USER32(00000000), ref: 00FB0DA5
              • GetKeyboardState.USER32(?), ref: 00FB0DBA
              • SetKeyboardState.USER32(?), ref: 00FB0E1B
              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00FB0E47
              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00FB0E64
              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00FB0EA8
              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00FB0EC9
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessagePost$KeyboardState$Parent
              • String ID:
              • API String ID: 87235514-0
              • Opcode ID: c87f2c30f277cbc148f03312fc26c076f0e17dcab5782daa6796da5df652d249
              • Instruction ID: 6fb07ac141ebeca29ac206ccd45c63e0099c0837296bdf932b674d435e31ebc8
              • Opcode Fuzzy Hash: c87f2c30f277cbc148f03312fc26c076f0e17dcab5782daa6796da5df652d249
              • Instruction Fuzzy Hash: C651E5A0A447D53DFB3243768C55BFB7FA96B06310F088889E1D54A8C2DB95EC98FB50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _wcsncpy$LocalTime
              • String ID:
              • API String ID: 2945705084-0
              • Opcode ID: 31afe45e4170d7f925a4a9170b49172059f61c70098571194214a51c02c28676
              • Instruction ID: 2195530b210e722198adbdb3b72182979023280248d80ccf2c4336347ee9fbc4
              • Opcode Fuzzy Hash: 31afe45e4170d7f925a4a9170b49172059f61c70098571194214a51c02c28676
              • Instruction Fuzzy Hash: EC41A465C1061876CB11EBB48C46ACFB3B89F04710F50C957E51DE3221EB38A355EBAB
              APIs
                • Part of subcall function 00FB466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00FB3697,?), ref: 00FB468B
                • Part of subcall function 00FB466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00FB3697,?), ref: 00FB46A4
              • lstrcmpiW.KERNEL32(?,?), ref: 00FB36B7
              • _wcscmp.LIBCMT ref: 00FB36D3
              • MoveFileW.KERNEL32(?,?), ref: 00FB36EB
              • _wcscat.LIBCMT ref: 00FB3733
              • SHFileOperationW.SHELL32(?), ref: 00FB379F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
              • String ID: \*.*
              • API String ID: 1377345388-1173974218
              • Opcode ID: 2c1a9877391e856fe65fb1b3e1b73ace3032f51f29d4f32b3a258e5203494d8b
              • Instruction ID: 74b8017ad8357a311419b310401a3735b9d3f3f9fbf3d442c007fc7cbc930630
              • Opcode Fuzzy Hash: 2c1a9877391e856fe65fb1b3e1b73ace3032f51f29d4f32b3a258e5203494d8b
              • Instruction Fuzzy Hash: 8D418072548344AEC751EF65C841ADFB7ECAF89390F10092EF49AC3251EA38D689DB52
              APIs
              • _memset.LIBCMT ref: 00FD72AA
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FD7351
              • IsMenu.USER32(?), ref: 00FD7369
              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00FD73B1
              • DrawMenuBar.USER32 ref: 00FD73C4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Menu$Item$DrawInfoInsert_memset
              • String ID: 0
              • API String ID: 3866635326-4108050209
              • Opcode ID: f3d903f2d87021683cf4075e73bc36246bbe4d3a5145056345f8f035531e5266
              • Instruction ID: b69ed3b2827f3aa805f3247adccd71cdc83f815129ea91cdbdba7bc441cc7e43
              • Opcode Fuzzy Hash: f3d903f2d87021683cf4075e73bc36246bbe4d3a5145056345f8f035531e5266
              • Instruction Fuzzy Hash: D8412775A04308AFDB20EF50D884E9ABBB6FB05320F18852AFD45AB350E731AD54EB50
              APIs
              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00FD0FD4
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00FD0FFE
              • FreeLibrary.KERNEL32(00000000), ref: 00FD10B5
                • Part of subcall function 00FD0FA5: RegCloseKey.ADVAPI32(?), ref: 00FD101B
                • Part of subcall function 00FD0FA5: FreeLibrary.KERNEL32(?), ref: 00FD106D
                • Part of subcall function 00FD0FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00FD1090
              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00FD1058
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: EnumFreeLibrary$CloseDeleteOpen
              • String ID:
              • API String ID: 395352322-0
              • Opcode ID: a30b98ccb261c153a5b7a60cbae78fa1f0561772805fa4270b6c6b81402ceab7
              • Instruction ID: ec3c5089cd1ae1bebb0156eb46914774b84129f382ae662ae3ea9e0b0978e082
              • Opcode Fuzzy Hash: a30b98ccb261c153a5b7a60cbae78fa1f0561772805fa4270b6c6b81402ceab7
              • Instruction Fuzzy Hash: 58310F71D01109BFDB15DFA0DC89EFFB7BDEF08310F14416AE512E2251DA745E89AAA0
              APIs
              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00FD62EC
              • GetWindowLongW.USER32(011744F0,000000F0), ref: 00FD631F
              • GetWindowLongW.USER32(011744F0,000000F0), ref: 00FD6354
              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00FD6386
              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00FD63B0
              • GetWindowLongW.USER32(00000000,000000F0), ref: 00FD63C1
              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00FD63DB
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: LongWindow$MessageSend
              • String ID:
              • API String ID: 2178440468-0
              • Opcode ID: a84780c0d44e67bc8f0c3359cad246772a8858a7576ec02b49cf95d83a4b07cc
              • Instruction ID: a6769d1d12fd873134093f0192d2ebd7dc6cc11fcb688f962ab4fcd943acd193
              • Opcode Fuzzy Hash: a84780c0d44e67bc8f0c3359cad246772a8858a7576ec02b49cf95d83a4b07cc
              • Instruction Fuzzy Hash: 6631F031A40254AFEB21CF68DC84F5437E2BB4A724F1901A6F941DF3B2CB76A844EB50
              APIs
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FADB2E
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FADB54
              • SysAllocString.OLEAUT32(00000000), ref: 00FADB57
              • SysAllocString.OLEAUT32(?), ref: 00FADB75
              • SysFreeString.OLEAUT32(?), ref: 00FADB7E
              • StringFromGUID2.OLE32(?,?,00000028), ref: 00FADBA3
              • SysAllocString.OLEAUT32(?), ref: 00FADBB1
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
              • String ID:
              • API String ID: 3761583154-0
              • Opcode ID: 082e47638a6160219fcedb6c27eb29a5a1f982ac6bde0c946f60681fa6f38e1d
              • Instruction ID: 1158895d42581213407382947be96e30730d5b7d43ac08e63b178f2d839760b5
              • Opcode Fuzzy Hash: 082e47638a6160219fcedb6c27eb29a5a1f982ac6bde0c946f60681fa6f38e1d
              • Instruction Fuzzy Hash: 4D21A372601219AF9F10DFB8DC84CBB73ADFB4A3A0B018126F916DB250D7709C45A7B0
              APIs
                • Part of subcall function 00FC7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00FC7DB6
              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00FC61C6
              • WSAGetLastError.WSOCK32(00000000), ref: 00FC61D5
              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00FC620E
              • connect.WSOCK32(00000000,?,00000010), ref: 00FC6217
              • WSAGetLastError.WSOCK32 ref: 00FC6221
              • closesocket.WSOCK32(00000000), ref: 00FC624A
              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00FC6263
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
              • String ID:
              • API String ID: 910771015-0
              • Opcode ID: 08daf9bd279495e075163ba81ea830f1883d67488a76699d7507715286257e67
              • Instruction ID: 7e1fecae13e8097dc007ff6488056b2de7384d1812e76ca9683ee5a505633eba
              • Opcode Fuzzy Hash: 08daf9bd279495e075163ba81ea830f1883d67488a76699d7507715286257e67
              • Instruction Fuzzy Hash: 9F319231604209AFDF10AF64CD86FBD77A9EB45721F08402DFD06E7291CB74AD08BAA1
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: __wcsnicmp
              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
              • API String ID: 1038674560-2734436370
              • Opcode ID: 9951c14b912e7d1a3bf01fdb71722e1cb1b5ec8f560e767c0947880bc80786fd
              • Instruction ID: 0711b9881ef2d99fab3386f402b887d4577f86ac2a64e635f0214d3f84680ca9
              • Opcode Fuzzy Hash: 9951c14b912e7d1a3bf01fdb71722e1cb1b5ec8f560e767c0947880bc80786fd
              • Instruction Fuzzy Hash: 182137B261451166D320A674AC02FA773DCEF56360F10843AF945CE151EB54AD4AF396
              APIs
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FADC09
              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00FADC2F
              • SysAllocString.OLEAUT32(00000000), ref: 00FADC32
              • SysAllocString.OLEAUT32 ref: 00FADC53
              • SysFreeString.OLEAUT32 ref: 00FADC5C
              • StringFromGUID2.OLE32(?,?,00000028), ref: 00FADC76
              • SysAllocString.OLEAUT32(?), ref: 00FADC84
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
              • String ID:
              • API String ID: 3761583154-0
              • Opcode ID: af5a00430b8e19dcc2d988c3a678b2ffd0eb50848971388c2e215197a9721b5d
              • Instruction ID: a3fe685d2240cb860249c96d78455c01014ead325d85ffb9c86604f6b83f7aec
              • Opcode Fuzzy Hash: af5a00430b8e19dcc2d988c3a678b2ffd0eb50848971388c2e215197a9721b5d
              • Instruction Fuzzy Hash: 6721BB76605104AF9B10DFB8DC88DAB77ECEB09370750C126F906CB260DA70EC45E764
              APIs
                • Part of subcall function 00F51D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F51D73
                • Part of subcall function 00F51D35: GetStockObject.GDI32(00000011), ref: 00F51D87
                • Part of subcall function 00F51D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F51D91
              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00FD7632
              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00FD763F
              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00FD764A
              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00FD7659
              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00FD7665
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$CreateObjectStockWindow
              • String ID: Msctls_Progress32
              • API String ID: 1025951953-3636473452
              • Opcode ID: 100b773626e5a3000291d02ff97cff786997f72103593dbd9e60d7bd44bc3cd2
              • Instruction ID: d1959ebc87ef0499fd8c9d35efb72d53b4396bb14231ca5a275d55ccb129b0a4
              • Opcode Fuzzy Hash: 100b773626e5a3000291d02ff97cff786997f72103593dbd9e60d7bd44bc3cd2
              • Instruction Fuzzy Hash: 8B1193B2110219BFEF119F64CC85EE77F6EEF087A8F014115BA44A6190DA72DC21EBA4
              APIs
              • __init_pointers.LIBCMT ref: 00F79AE6
                • Part of subcall function 00F73187: EncodePointer.KERNEL32(00000000), ref: 00F7318A
                • Part of subcall function 00F73187: __initp_misc_winsig.LIBCMT ref: 00F731A5
                • Part of subcall function 00F73187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00F79EA0
                • Part of subcall function 00F73187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00F79EB4
                • Part of subcall function 00F73187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00F79EC7
                • Part of subcall function 00F73187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00F79EDA
                • Part of subcall function 00F73187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00F79EED
                • Part of subcall function 00F73187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00F79F00
                • Part of subcall function 00F73187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00F79F13
                • Part of subcall function 00F73187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00F79F26
                • Part of subcall function 00F73187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00F79F39
                • Part of subcall function 00F73187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00F79F4C
                • Part of subcall function 00F73187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00F79F5F
                • Part of subcall function 00F73187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00F79F72
                • Part of subcall function 00F73187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00F79F85
                • Part of subcall function 00F73187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00F79F98
                • Part of subcall function 00F73187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00F79FAB
                • Part of subcall function 00F73187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00F79FBE
              • __mtinitlocks.LIBCMT ref: 00F79AEB
              • __mtterm.LIBCMT ref: 00F79AF4
                • Part of subcall function 00F79B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00F79AF9,00F77CD0,0100A0B8,00000014), ref: 00F79C56
                • Part of subcall function 00F79B5C: _free.LIBCMT ref: 00F79C5D
                • Part of subcall function 00F79B5C: DeleteCriticalSection.KERNEL32(0100EC00,?,?,00F79AF9,00F77CD0,0100A0B8,00000014), ref: 00F79C7F
              • __calloc_crt.LIBCMT ref: 00F79B19
              • __initptd.LIBCMT ref: 00F79B3B
              • GetCurrentThreadId.KERNEL32 ref: 00F79B42
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
              • String ID:
              • API String ID: 3567560977-0
              • Opcode ID: a707c1925c10d03b227f3d022ad1462d22506a9315b8b48d630e8156ce94dbf0
              • Instruction ID: 7c4d18d20af3517d4f1cfe888eddb96e6959d11502592237a8b141f0d099ef1b
              • Opcode Fuzzy Hash: a707c1925c10d03b227f3d022ad1462d22506a9315b8b48d630e8156ce94dbf0
              • Instruction Fuzzy Hash: 40F0623291E71169E6347778BC07A4A37919F42730F20CA1FF49CD51D2EED985416163
              APIs
              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00F73F85), ref: 00F74085
              • GetProcAddress.KERNEL32(00000000), ref: 00F7408C
              • EncodePointer.KERNEL32(00000000), ref: 00F74097
              • DecodePointer.KERNEL32(00F73F85), ref: 00F740B2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
              • String ID: RoUninitialize$combase.dll
              • API String ID: 3489934621-2819208100
              • Opcode ID: 991e944621676d4a59b7aee7827121aa8487df9a0dbc22620b2b6051d549b92f
              • Instruction ID: ca249f3e8283048829534acbc8ae5f5f2cdb4bc0c03132ff727470a0aa596b25
              • Opcode Fuzzy Hash: 991e944621676d4a59b7aee7827121aa8487df9a0dbc22620b2b6051d549b92f
              • Instruction Fuzzy Hash: 00E09A70982204ABEA61AF71EC09F053AB5B704752F104036F546E5194DBBB9504EB15
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _memmove$__itow__swprintf
              • String ID:
              • API String ID: 3253778849-0
              • Opcode ID: 06c3e0da596de7e5ebd166ea91c544cb533233ce1895cc83c049d75c6dd0b7a7
              • Instruction ID: b2d6ea49d8f833e1e2fa6e2a7a35cbd01faa8d75bdd0cf17c8d0d9d7b8823557
              • Opcode Fuzzy Hash: 06c3e0da596de7e5ebd166ea91c544cb533233ce1895cc83c049d75c6dd0b7a7
              • Instruction Fuzzy Hash: 3361AB3190064A9BCF15EF61CC82EFE37A5AF05308F084519FD19AB192DB7CE809EB51
              APIs
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
                • Part of subcall function 00FD0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FCFDAD,?,?), ref: 00FD0E31
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FD02BD
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00FD02FD
              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00FD0320
              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00FD0349
              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00FD038C
              • RegCloseKey.ADVAPI32(00000000), ref: 00FD0399
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
              • String ID:
              • API String ID: 4046560759-0
              • Opcode ID: 217c03103b4685119670a30906a1232e014dfce5a859227bf75f72758138ce77
              • Instruction ID: 774ddc639f689498d0a5e202970adb1ea03c28bd492b4961fa581bb50f10590a
              • Opcode Fuzzy Hash: 217c03103b4685119670a30906a1232e014dfce5a859227bf75f72758138ce77
              • Instruction Fuzzy Hash: 61514771508304AFC714EB64DC85E6EBBEAFF85314F08491EF945872A2DB35E908EB52
              APIs
              • GetMenu.USER32(?), ref: 00FD57FB
              • GetMenuItemCount.USER32(00000000), ref: 00FD5832
              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00FD585A
              • GetMenuItemID.USER32(?,?), ref: 00FD58C9
              • GetSubMenu.USER32(?,?), ref: 00FD58D7
              • PostMessageW.USER32(?,00000111,?,00000000), ref: 00FD5928
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Menu$Item$CountMessagePostString
              • String ID:
              • API String ID: 650687236-0
              • Opcode ID: 9e2bbd693441885e8700d1f10745a38262dea233e315ba319c0d1156b5878f89
              • Instruction ID: 4d0c9cb969bafb59847d8eee437494df8063e7ad20749396d1a01e7411fe19cf
              • Opcode Fuzzy Hash: 9e2bbd693441885e8700d1f10745a38262dea233e315ba319c0d1156b5878f89
              • Instruction Fuzzy Hash: C3516E31E00615EFCF11EF64C845AAEB7B6EF48720F18405AE906BB351CB74AE41AB91
              APIs
              • VariantInit.OLEAUT32(?), ref: 00FAEF06
              • VariantClear.OLEAUT32(00000013), ref: 00FAEF78
              • VariantClear.OLEAUT32(00000000), ref: 00FAEFD3
              • _memmove.LIBCMT ref: 00FAEFFD
              • VariantClear.OLEAUT32(?), ref: 00FAF04A
              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00FAF078
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Variant$Clear$ChangeInitType_memmove
              • String ID:
              • API String ID: 1101466143-0
              • Opcode ID: 4135a5f9c50ce6effdeb2a81f10193c75f50c9fdaa78457e479c3ad06572e642
              • Instruction ID: 4e82491cc825f300957f77a23641207ec4541c8c74d61dfc2129595962f021ed
              • Opcode Fuzzy Hash: 4135a5f9c50ce6effdeb2a81f10193c75f50c9fdaa78457e479c3ad06572e642
              • Instruction Fuzzy Hash: AE516AB5A00209EFCB14CF58C880AAAB7B9FF4D314B15856AE959DB305E334E915CBA0
              APIs
              • _memset.LIBCMT ref: 00FB2258
              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00FB22A3
              • IsMenu.USER32(00000000), ref: 00FB22C3
              • CreatePopupMenu.USER32 ref: 00FB22F7
              • GetMenuItemCount.USER32(000000FF), ref: 00FB2355
              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00FB2386
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
              • String ID:
              • API String ID: 3311875123-0
              • Opcode ID: a0224fa381c3ef50227370b9499d195507a16561f06489992f8c94ff2799142e
              • Instruction ID: 7b8a0e09e61311edb34afcf8598d13b19c51df9bb70f81ca3e0739866d250c60
              • Opcode Fuzzy Hash: a0224fa381c3ef50227370b9499d195507a16561f06489992f8c94ff2799142e
              • Instruction Fuzzy Hash: 0151BE30A01209DBDF61CF6AD888BEEBBF5AF45324F18412AE815972A0D3788944EF51
              APIs
                • Part of subcall function 00F52612: GetWindowLongW.USER32(?,000000EB), ref: 00F52623
              • BeginPaint.USER32(?,?,?,?,?,?), ref: 00F5179A
              • GetWindowRect.USER32(?,?), ref: 00F517FE
              • ScreenToClient.USER32(?,?), ref: 00F5181B
              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00F5182C
              • EndPaint.USER32(?,?), ref: 00F51876
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: PaintWindow$BeginClientLongRectScreenViewport
              • String ID:
              • API String ID: 1827037458-0
              • Opcode ID: 244b98ddfdefc67a1461b61c165ed3ec9f977d45c4d48ab48067097415ec7bee
              • Instruction ID: 08999453b852a569268a63ab560897aaae3c0d47c9d28f0bcca40a5b06d324bd
              • Opcode Fuzzy Hash: 244b98ddfdefc67a1461b61c165ed3ec9f977d45c4d48ab48067097415ec7bee
              • Instruction Fuzzy Hash: 56419331504300AFD720DF24CC84FB67BE9FB4A725F144669FAA58B1A1C735A849EB61
              APIs
              • ShowWindow.USER32(010157B0,00000000,011744F0,?,?,010157B0,?,00FDB5A8,?,?), ref: 00FDB712
              • EnableWindow.USER32(00000000,00000000), ref: 00FDB736
              • ShowWindow.USER32(010157B0,00000000,011744F0,?,?,010157B0,?,00FDB5A8,?,?), ref: 00FDB796
              • ShowWindow.USER32(00000000,00000004,?,00FDB5A8,?,?), ref: 00FDB7A8
              • EnableWindow.USER32(00000000,00000001), ref: 00FDB7CC
              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00FDB7EF
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$Show$Enable$MessageSend
              • String ID:
              • API String ID: 642888154-0
              • Opcode ID: 535e734e3b7d15cdb863dac21b756fb51798d27477ebe29810cd07ba2e120dda
              • Instruction ID: 75073a729e2459b6788af0e3c9faee7c9f5ee2bea5ed0a78fbf02ecb530f7bf4
              • Opcode Fuzzy Hash: 535e734e3b7d15cdb863dac21b756fb51798d27477ebe29810cd07ba2e120dda
              • Instruction Fuzzy Hash: 01416D34A01244EFDB22DF24C499B947BE2FB45320F1D41BAE9598F7A2C731A856EB50
              APIs
              • GetForegroundWindow.USER32(?,?,?,?,?,?,00FC4E41,?,?,00000000,00000001), ref: 00FC70AC
                • Part of subcall function 00FC39A0: GetWindowRect.USER32(?,?), ref: 00FC39B3
              • GetDesktopWindow.USER32 ref: 00FC70D6
              • GetWindowRect.USER32(00000000), ref: 00FC70DD
              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00FC710F
                • Part of subcall function 00FB5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FB52BC
              • GetCursorPos.USER32(?), ref: 00FC713B
              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00FC7199
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
              • String ID:
              • API String ID: 4137160315-0
              • Opcode ID: 613212c08eae889afea805cfeb9669265dd5c5bb7f269d841fefd8494b5b55bd
              • Instruction ID: ad0ddbff7ae4f65216e6271e30ea9675172aff72aca51ccfe394c9cbdc93783f
              • Opcode Fuzzy Hash: 613212c08eae889afea805cfeb9669265dd5c5bb7f269d841fefd8494b5b55bd
              • Instruction Fuzzy Hash: 3131C17250930AABD720EF24DC49F9BB7AAFB88314F04091AF58597191C734EA09DB92
              APIs
                • Part of subcall function 00FA80A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00FA80C0
                • Part of subcall function 00FA80A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00FA80CA
                • Part of subcall function 00FA80A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00FA80D9
                • Part of subcall function 00FA80A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00FA80E0
                • Part of subcall function 00FA80A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00FA80F6
              • GetLengthSid.ADVAPI32(?,00000000,00FA842F), ref: 00FA88CA
              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00FA88D6
              • HeapAlloc.KERNEL32(00000000), ref: 00FA88DD
              • CopySid.ADVAPI32(00000000,00000000,?), ref: 00FA88F6
              • GetProcessHeap.KERNEL32(00000000,00000000,00FA842F), ref: 00FA890A
              • HeapFree.KERNEL32(00000000), ref: 00FA8911
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
              • String ID:
              • API String ID: 3008561057-0
              • Opcode ID: 80bcc0004e6f2f78543fa4770adaa8feb0a6f98a3e9a0a027248c436ad25788d
              • Instruction ID: 1fc2ddfddc9a6d76253242ab86a440a97fc3aca12b2797915e832255fa00d22c
              • Opcode Fuzzy Hash: 80bcc0004e6f2f78543fa4770adaa8feb0a6f98a3e9a0a027248c436ad25788d
              • Instruction Fuzzy Hash: 2F11A2B1902209FFDB109FA4DC09FBF7779EB46761F148029E84697111CB769E05EB60
              APIs
              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00FA85E2
              • OpenProcessToken.ADVAPI32(00000000), ref: 00FA85E9
              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00FA85F8
              • CloseHandle.KERNEL32(00000004), ref: 00FA8603
              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00FA8632
              • DestroyEnvironmentBlock.USERENV(00000000), ref: 00FA8646
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
              • String ID:
              • API String ID: 1413079979-0
              • Opcode ID: dd5d204802478f3df64a3c68b73cc856df8bb6f6eccdbbbe197a16fb5f764114
              • Instruction ID: c86c8336761ee6e1f3a81a56e0320303c5c43ce6a0184019d0263e9e96cdba85
              • Opcode Fuzzy Hash: dd5d204802478f3df64a3c68b73cc856df8bb6f6eccdbbbe197a16fb5f764114
              • Instruction Fuzzy Hash: 3C114AB290120DABDF028FA4DD49FDA7BA9EF09354F084065FE05A2160C6718D65AB60
              APIs
              • GetDC.USER32(00000000), ref: 00FAB7B5
              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00FAB7C6
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00FAB7CD
              • ReleaseDC.USER32(00000000,00000000), ref: 00FAB7D5
              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00FAB7EC
              • MulDiv.KERNEL32(000009EC,?,?), ref: 00FAB7FE
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CapsDevice$Release
              • String ID:
              • API String ID: 1035833867-0
              • Opcode ID: cd432947662e31402638d2df2ddcf9fff4f5063ab980c53fbc94d91626ee3a00
              • Instruction ID: 0078651a2b003c54b35d4d81558610f84ba8333ae6cfe48481df238591ac207e
              • Opcode Fuzzy Hash: cd432947662e31402638d2df2ddcf9fff4f5063ab980c53fbc94d91626ee3a00
              • Instruction Fuzzy Hash: 680184B5E01309BBEB109BB69C49E5EBFB9EB49321F008076FA04E7291D6709D00DF90
              APIs
              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00F70193
              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00F7019B
              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00F701A6
              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00F701B1
              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00F701B9
              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F701C1
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Virtual
              • String ID:
              • API String ID: 4278518827-0
              • Opcode ID: a5889ce5d93cc965d3ea1fe76ba8bfe68bf7fccf82f309f6a93ee82f44e407b8
              • Instruction ID: c42c9a8cab78201a908ea8c6444d874727ab3b05fe3c0089d8626347b7b678bb
              • Opcode Fuzzy Hash: a5889ce5d93cc965d3ea1fe76ba8bfe68bf7fccf82f309f6a93ee82f44e407b8
              • Instruction Fuzzy Hash: BC016CB09027597DE3008F6A8C85B52FFA8FF19354F00411BA15C47941C7F5A868CBE5
              APIs
              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00FB53F9
              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00FB540F
              • GetWindowThreadProcessId.USER32(?,?), ref: 00FB541E
              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FB542D
              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FB5437
              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00FB543E
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
              • String ID:
              • API String ID: 839392675-0
              • Opcode ID: 29a0069daf1e46bd44ee0e4d6db63c45d43cb533c50cd9b21e85cd3b9b5497be
              • Instruction ID: eef5e82dfed3f5e10fc26e1c773f80e11aacc425a2636cbcf710dfe8d1a17be1
              • Opcode Fuzzy Hash: 29a0069daf1e46bd44ee0e4d6db63c45d43cb533c50cd9b21e85cd3b9b5497be
              • Instruction Fuzzy Hash: F6F0903224215CBBE3215BB2DC0DEEF7B7DEFC6B11F00016AFA06D1050DBA15A05A6B5
              APIs
              • InterlockedExchange.KERNEL32(?,?), ref: 00FB7243
              • EnterCriticalSection.KERNEL32(?,?,00F60EE4,?,?), ref: 00FB7254
              • TerminateThread.KERNEL32(00000000,000001F6,?,00F60EE4,?,?), ref: 00FB7261
              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00F60EE4,?,?), ref: 00FB726E
                • Part of subcall function 00FB6C35: CloseHandle.KERNEL32(00000000,?,00FB727B,?,00F60EE4,?,?), ref: 00FB6C3F
              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00FB7281
              • LeaveCriticalSection.KERNEL32(?,?,00F60EE4,?,?), ref: 00FB7288
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
              • String ID:
              • API String ID: 3495660284-0
              • Opcode ID: ca4ece7717943227fda67afa8e87acd8eae2fa0e510f505f760c0a18aed26613
              • Instruction ID: 969aaeb34d417f984e920b8a9abf86b2b6331eec6db3a6d07f90aed002ec0565
              • Opcode Fuzzy Hash: ca4ece7717943227fda67afa8e87acd8eae2fa0e510f505f760c0a18aed26613
              • Instruction Fuzzy Hash: 73F05E36542616EBD7112B74ED4CEDA772AEF45713B100532F543910A0CB7A5905EF50
              APIs
              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00FA899D
              • UnloadUserProfile.USERENV(?,?), ref: 00FA89A9
              • CloseHandle.KERNEL32(?), ref: 00FA89B2
              • CloseHandle.KERNEL32(?), ref: 00FA89BA
              • GetProcessHeap.KERNEL32(00000000,?), ref: 00FA89C3
              • HeapFree.KERNEL32(00000000), ref: 00FA89CA
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
              • String ID:
              • API String ID: 146765662-0
              • Opcode ID: 665af79d9f8031eb8a0be0750c4f8c096f833d47bf085e15dbdf062fbc09a3cd
              • Instruction ID: 0236527aff4bbb28160d57bbdf65a4adf49beb357abd0882a148931a9a8961d1
              • Opcode Fuzzy Hash: 665af79d9f8031eb8a0be0750c4f8c096f833d47bf085e15dbdf062fbc09a3cd
              • Instruction Fuzzy Hash: DEE0C236105009FBDB022FF5EC0CD4ABB6AFB89322B108232F21A81170CB329428EB50
              APIs
              • VariantInit.OLEAUT32(?), ref: 00FC8613
              • CharUpperBuffW.USER32(?,?), ref: 00FC8722
              • VariantClear.OLEAUT32(?), ref: 00FC889A
                • Part of subcall function 00FB7562: VariantInit.OLEAUT32(00000000), ref: 00FB75A2
                • Part of subcall function 00FB7562: VariantCopy.OLEAUT32(00000000,?), ref: 00FB75AB
                • Part of subcall function 00FB7562: VariantClear.OLEAUT32(00000000), ref: 00FB75B7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Variant$ClearInit$BuffCharCopyUpper
              • String ID: AUTOIT.ERROR$Incorrect Parameter format
              • API String ID: 4237274167-1221869570
              • Opcode ID: 17a31d3262a887ad68c5c826cc271750ec5c6c32fc436402c295648234232861
              • Instruction ID: 8e7cf26e390f6573f86649064ed0d5015f0ee615b56b8dde085cbe1d64447ece
              • Opcode Fuzzy Hash: 17a31d3262a887ad68c5c826cc271750ec5c6c32fc436402c295648234232861
              • Instruction Fuzzy Hash: E6917D71A08302DFC714DF24C985E5AB7E4AF89754F04892EF98A8B361DB34ED0ADB51
              APIs
                • Part of subcall function 00F6FC86: _wcscpy.LIBCMT ref: 00F6FCA9
              • _memset.LIBCMT ref: 00FB2B87
              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FB2BB6
              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00FB2C69
              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00FB2C97
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ItemMenu$Info$Default_memset_wcscpy
              • String ID: 0
              • API String ID: 4152858687-4108050209
              • Opcode ID: 85784b8f234163f2092934cd9730b6d76c4a3864968b6439790826a019beb42c
              • Instruction ID: 332066236d4c8914bbd2b5f4520763c783a48c82eefd108c90e34ead38ff0006
              • Opcode Fuzzy Hash: 85784b8f234163f2092934cd9730b6d76c4a3864968b6439790826a019beb42c
              • Instruction Fuzzy Hash: E751C3B19083019AD7A49F29DC45AAF7BE8EF89330F04492DF895D7190DB74CD44AF92
              APIs
              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00FAD5D4
              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00FAD60A
              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00FAD61B
              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00FAD69D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ErrorMode$AddressCreateInstanceProc
              • String ID: DllGetClassObject
              • API String ID: 753597075-1075368562
              • Opcode ID: ce4cae87b12dd239b4b10c003357896c35dbb0cf1e34cd261ee5d4c5e8464fc7
              • Instruction ID: 8054745f0ecc7c2f36aa11c632a2492eac760528ed014888ebca3eccab4a4862
              • Opcode Fuzzy Hash: ce4cae87b12dd239b4b10c003357896c35dbb0cf1e34cd261ee5d4c5e8464fc7
              • Instruction Fuzzy Hash: 79419FF2600204EFDB05CF64C884B9A7BB9EF45314F1581AAEC0A9F645D7B5DE44EBA0
              APIs
              • _memset.LIBCMT ref: 00FB27C0
              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00FB27DC
              • DeleteMenu.USER32(?,00000007,00000000), ref: 00FB2822
              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,01015890,00000000), ref: 00FB286B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Menu$Delete$InfoItem_memset
              • String ID: 0
              • API String ID: 1173514356-4108050209
              • Opcode ID: 9577de8f6ea2b1d44a8bf39ec35971232eaa1a7ec7a0dccffd22c2457028ae35
              • Instruction ID: 1f5650b82806b3a21d72e502d39a5cad1eadbdee887a34955ab8a27704636631
              • Opcode Fuzzy Hash: 9577de8f6ea2b1d44a8bf39ec35971232eaa1a7ec7a0dccffd22c2457028ae35
              • Instruction Fuzzy Hash: 5741BD716043019FD760DF26DC44B9ABBE8EF85320F044A2EF9A697291D734E905DB52
              APIs
              • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00FCD7C5
                • Part of subcall function 00F5784B: _memmove.LIBCMT ref: 00F57899
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: BuffCharLower_memmove
              • String ID: cdecl$none$stdcall$winapi
              • API String ID: 3425801089-567219261
              • Opcode ID: bec518073bfb00ec57f099252c84c8ed17ad72ed81b0f36b964b6edc72b42657
              • Instruction ID: bedecc6fecef14fc282a0857f284002f7c26c45fedb357b9d34eff80ab014350
              • Opcode Fuzzy Hash: bec518073bfb00ec57f099252c84c8ed17ad72ed81b0f36b964b6edc72b42657
              • Instruction Fuzzy Hash: B731CF7190060AABDF00EF54CD52EAEB3B5FF04720F10862EE869976D1DB35AD09DB80
              APIs
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
                • Part of subcall function 00FAAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FAAABC
              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00FA8F14
              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00FA8F27
              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00FA8F57
                • Part of subcall function 00F57BCC: _memmove.LIBCMT ref: 00F57C06
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$_memmove$ClassName
              • String ID: ComboBox$ListBox
              • API String ID: 365058703-1403004172
              • Opcode ID: 7e68d5e1125c28bbe7543ad771158ae19e106e4d3ff3a096ddb91baecc3b2daf
              • Instruction ID: 3c4065ea2479eb60e669b07aff418cfd386ece974780eafb84b8a45c51f0dc2e
              • Opcode Fuzzy Hash: 7e68d5e1125c28bbe7543ad771158ae19e106e4d3ff3a096ddb91baecc3b2daf
              • Instruction Fuzzy Hash: 2D21E1B5A00109BEDB14ABB09C85DFEB779DF06360F04812AF825971E0DF7D590EB610
              APIs
              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00FC184C
              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00FC1872
              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00FC18A2
              • InternetCloseHandle.WININET(00000000), ref: 00FC18E9
                • Part of subcall function 00FC2483: GetLastError.KERNEL32(?,?,00FC1817,00000000,00000000,00000001), ref: 00FC2498
                • Part of subcall function 00FC2483: SetEvent.KERNEL32(?,?,00FC1817,00000000,00000000,00000001), ref: 00FC24AD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
              • String ID:
              • API String ID: 3113390036-3916222277
              • Opcode ID: ef4f1b54d6294b9e8b9ba888359adf048d25f74a1e9eaead4a530a398409284d
              • Instruction ID: 026d25a95dcd54f1867ed11e5d9f964a8325030231eef70268a4237238d06ce3
              • Opcode Fuzzy Hash: ef4f1b54d6294b9e8b9ba888359adf048d25f74a1e9eaead4a530a398409284d
              • Instruction Fuzzy Hash: 6621AFB150420EBFEB11AB608D86FBB77ADFB49754F10412EF50592181DB348D1877A1
              APIs
                • Part of subcall function 00F51D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F51D73
                • Part of subcall function 00F51D35: GetStockObject.GDI32(00000011), ref: 00F51D87
                • Part of subcall function 00F51D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F51D91
              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00FD6461
              • LoadLibraryW.KERNEL32(?), ref: 00FD6468
              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00FD647D
              • DestroyWindow.USER32(?), ref: 00FD6485
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
              • String ID: SysAnimate32
              • API String ID: 4146253029-1011021900
              • Opcode ID: f96b9dc2e582c852ebda6f8a0f1cab13b280a44d70c5cd95d861b16afde78ad9
              • Instruction ID: 5ef96ce8fadc3f9b673316c12807fc46656b04f49cc9f0641579e630d5a9124a
              • Opcode Fuzzy Hash: f96b9dc2e582c852ebda6f8a0f1cab13b280a44d70c5cd95d861b16afde78ad9
              • Instruction Fuzzy Hash: CE215B71600205AFEF108F64DC80EBB77AEEB5A378F18862AFA50D6290D775DC51B760
              APIs
              • GetStdHandle.KERNEL32(0000000C), ref: 00FB6DBC
              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FB6DEF
              • GetStdHandle.KERNEL32(0000000C), ref: 00FB6E01
              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00FB6E3B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CreateHandle$FilePipe
              • String ID: nul
              • API String ID: 4209266947-2873401336
              • Opcode ID: ca914a82b89b6897a9bb8970dfbe027a0f46b1a95bfd7f960e09748c30ffcea6
              • Instruction ID: 565ce6099b8cca2cd8c5323054b0166d9c3bd7a07b4a1a38f6b6d9d01e75fb4b
              • Opcode Fuzzy Hash: ca914a82b89b6897a9bb8970dfbe027a0f46b1a95bfd7f960e09748c30ffcea6
              • Instruction Fuzzy Hash: A021AE75A00209ABDB209F2ADC04ADA7BA4EF48720F204A2AFCA1D72D0D7749915AF54
              APIs
              • GetStdHandle.KERNEL32(000000F6), ref: 00FB6E89
              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00FB6EBB
              • GetStdHandle.KERNEL32(000000F6), ref: 00FB6ECC
              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00FB6F06
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CreateHandle$FilePipe
              • String ID: nul
              • API String ID: 4209266947-2873401336
              • Opcode ID: 5d55910844d66d06185667decc2d54f5901028718c13bf6dfbe8498dbca8ca98
              • Instruction ID: 4b07f157a3b23c9c5184507e33a97cd39346075765c25b3759840f56aef656bf
              • Opcode Fuzzy Hash: 5d55910844d66d06185667decc2d54f5901028718c13bf6dfbe8498dbca8ca98
              • Instruction Fuzzy Hash: B621A1799003059BDB209F6ADC04AEA77A8EF45730F200A2AFDA1D72D0D774E850EF54
              APIs
              • SetErrorMode.KERNEL32(00000001), ref: 00FBAC54
              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00FBACA8
              • __swprintf.LIBCMT ref: 00FBACC1
              • SetErrorMode.KERNEL32(00000000,00000001,00000000,00FDF910), ref: 00FBACFF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ErrorMode$InformationVolume__swprintf
              • String ID: %lu
              • API String ID: 3164766367-685833217
              • Opcode ID: 2b149e37e8a37d0e6119b80ad0a78581209278bcb59445c5fd0ab803ce5bbfa6
              • Instruction ID: 43f3c6b814c38279b283cb004668aa9a757e5c4b0d6646c3740a3746bc5ba204
              • Opcode Fuzzy Hash: 2b149e37e8a37d0e6119b80ad0a78581209278bcb59445c5fd0ab803ce5bbfa6
              • Instruction Fuzzy Hash: 3721AF70A00209EFCB10EF65CD45DEE7BB8FF49715B0440AAF909EB251DA75EA05EB21
              APIs
              • CharUpperBuffW.USER32(?,?), ref: 00FB1B19
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: BuffCharUpper
              • String ID: APPEND$EXISTS$KEYS$REMOVE
              • API String ID: 3964851224-769500911
              • Opcode ID: f5e9f16d755bd6a087daf885335d960621cb499eb3055f94e954822fa3c49600
              • Instruction ID: 6f23817d1a4d39845590a3f7990f2fc44ee73d8c9e05a2d26634441363d29bc8
              • Opcode Fuzzy Hash: f5e9f16d755bd6a087daf885335d960621cb499eb3055f94e954822fa3c49600
              • Instruction Fuzzy Hash: DD117930D002088B9F00EFA4DC628EEB7B4BF65704F50C49AD854A7696EB36590AEF40
              APIs
              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00FCEC07
              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00FCEC37
              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00FCED6A
              • CloseHandle.KERNEL32(?), ref: 00FCEDEB
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Process$CloseCountersHandleInfoMemoryOpen
              • String ID:
              • API String ID: 2364364464-0
              • Opcode ID: 4b56513a586887b791222f971f913f8b4a4a565485ef9ba1b0a2cb047b953181
              • Instruction ID: 3f9a60e4eae7ede5281484833d0ea0786c0994edbe2b373ef9959fb5c52f5254
              • Opcode Fuzzy Hash: 4b56513a586887b791222f971f913f8b4a4a565485ef9ba1b0a2cb047b953181
              • Instruction Fuzzy Hash: 508191716047019FD724EF28CC46F2AB7E5AF84721F04881DFA9ADB292D7B4AC05DB51
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
              • String ID:
              • API String ID: 1559183368-0
              • Opcode ID: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
              • Instruction ID: 9cea0cc287795c68ce116a62808c7fbaaacb690c6a91230e76976580a65f0215
              • Opcode Fuzzy Hash: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
              • Instruction Fuzzy Hash: 9951B971E00B059BCB24DF69DC4066E77A2AF40B35F28C72BF82D962D0D7B49D50AB42
              APIs
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
                • Part of subcall function 00FD0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00FCFDAD,?,?), ref: 00FD0E31
              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00FD00FD
              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00FD013C
              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00FD0183
              • RegCloseKey.ADVAPI32(?,?), ref: 00FD01AF
              • RegCloseKey.ADVAPI32(00000000), ref: 00FD01BC
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
              • String ID:
              • API String ID: 3440857362-0
              • Opcode ID: 4f7b0fde7be1d61b892abfd729a923020f7ad8ef938be35bb15b59a9af8cac38
              • Instruction ID: ceb1fc45043e07e8d7a28e7a34d67ee7a2efd6cd8f72423614fe217c1b8e38d2
              • Opcode Fuzzy Hash: 4f7b0fde7be1d61b892abfd729a923020f7ad8ef938be35bb15b59a9af8cac38
              • Instruction Fuzzy Hash: E8515C71608204AFD704EF64CC85F6AB7E9FF84314F48492EF956872A1DB35E908EB52
              APIs
                • Part of subcall function 00F59837: __itow.LIBCMT ref: 00F59862
                • Part of subcall function 00F59837: __swprintf.LIBCMT ref: 00F598AC
              • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00FCD927
              • GetProcAddress.KERNEL32(00000000,?), ref: 00FCD9AA
              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00FCD9C6
              • GetProcAddress.KERNEL32(00000000,?), ref: 00FCDA07
              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00FCDA21
                • Part of subcall function 00F55A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FB7896,?,?,00000000), ref: 00F55A2C
                • Part of subcall function 00F55A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FB7896,?,?,00000000,?,?), ref: 00F55A50
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
              • String ID:
              • API String ID: 327935632-0
              • Opcode ID: 0219d6a6f47eb1f35523b5da0a5f92d5b21b3549406fa746556fbdf40c6052da
              • Instruction ID: 17da6b3da031571373d66f40644b6f695cb2a24fe19bd043d130d45710184c5f
              • Opcode Fuzzy Hash: 0219d6a6f47eb1f35523b5da0a5f92d5b21b3549406fa746556fbdf40c6052da
              • Instruction Fuzzy Hash: 90514A75A0420ADFCB00EFA8C885EADB7F5EF48320B148069E916AB312D735ED49DF50
              APIs
              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00FBE61F
              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00FBE648
              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00FBE687
                • Part of subcall function 00F59837: __itow.LIBCMT ref: 00F59862
                • Part of subcall function 00F59837: __swprintf.LIBCMT ref: 00F598AC
              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00FBE6AC
              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00FBE6B4
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
              • String ID:
              • API String ID: 1389676194-0
              • Opcode ID: 05bf01aaf121a3ff5d115887aeb8bd6b6b5e357eca7cd65ce5f4b57cef6c490c
              • Instruction ID: f86f66be16823a03260d7c577adf8c5da2a4da5d898c490bcc0ab32d240e1d68
              • Opcode Fuzzy Hash: 05bf01aaf121a3ff5d115887aeb8bd6b6b5e357eca7cd65ce5f4b57cef6c490c
              • Instruction Fuzzy Hash: DB513A35A00605DFCB04EF65CD81AADBBF5EF09315B1880A9E909AB361CB35ED14EF50
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 021eb403e8bc7704634a9077e3ad3bcf55fb862aaa7eb22109069bb7ca1f2a04
              • Instruction ID: 037e7cedea3817b6a9d3e81496dd9cf8a43a067abc959399133b9781b1f7d6e7
              • Opcode Fuzzy Hash: 021eb403e8bc7704634a9077e3ad3bcf55fb862aaa7eb22109069bb7ca1f2a04
              • Instruction Fuzzy Hash: 9541B036D05104AFD720DF38CC48FA9BBA6AB09320F184267E856A73E1C730AD45FA59
              APIs
              • GetCursorPos.USER32(?), ref: 00F52357
              • ScreenToClient.USER32(010157B0,?), ref: 00F52374
              • GetAsyncKeyState.USER32(00000001), ref: 00F52399
              • GetAsyncKeyState.USER32(00000002), ref: 00F523A7
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: AsyncState$ClientCursorScreen
              • String ID:
              • API String ID: 4210589936-0
              • Opcode ID: 8ecfcbea8a7caa2008533d840f1df088515a1767caaadfe4d484af0691dbf08d
              • Instruction ID: 7a4395ad2cbf0f8eb395ad2dd492b075976aadd03500ae1769445794618c54c4
              • Opcode Fuzzy Hash: 8ecfcbea8a7caa2008533d840f1df088515a1767caaadfe4d484af0691dbf08d
              • Instruction Fuzzy Hash: 13416035A04109FBCF159F68CC44AEDBB75BB06371F20435AF929D2290CB349958EFA1
              APIs
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FA63E7
              • TranslateAcceleratorW.USER32(?,?,?), ref: 00FA6433
              • TranslateMessage.USER32(?), ref: 00FA645C
              • DispatchMessageW.USER32(?), ref: 00FA6466
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00FA6475
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Message$PeekTranslate$AcceleratorDispatch
              • String ID:
              • API String ID: 2108273632-0
              • Opcode ID: b1c78dc1f24f5ae3335cd520494a7fa2bc11830a3b7ce38c61e87ff199f94161
              • Instruction ID: cbbc49e581551cae378af147d398d7cec38b52e1884d80e4e300ad8b2f1e9e33
              • Opcode Fuzzy Hash: b1c78dc1f24f5ae3335cd520494a7fa2bc11830a3b7ce38c61e87ff199f94161
              • Instruction Fuzzy Hash: E831C5B2D00646AFDB24CEB4DC44FB67BE8AB0B320F184165E865C6190E72E9449F760
              APIs
              • GetWindowRect.USER32(?,?), ref: 00FA8A30
              • PostMessageW.USER32(?,00000201,00000001), ref: 00FA8ADA
              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00FA8AE2
              • PostMessageW.USER32(?,00000202,00000000), ref: 00FA8AF0
              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00FA8AF8
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessagePostSleep$RectWindow
              • String ID:
              • API String ID: 3382505437-0
              • Opcode ID: 27773460788e2b3f6c5c25992229b8a19ea8e176d1b78b581e538b7b7fd2b383
              • Instruction ID: e0bd2ac90b28be8fe1bdbe5a3a15ecb2c937848c85cbc2eb887a31d45461eb81
              • Opcode Fuzzy Hash: 27773460788e2b3f6c5c25992229b8a19ea8e176d1b78b581e538b7b7fd2b383
              • Instruction Fuzzy Hash: 2331E0B1900219FBDF14CFA8DD4CA9E3BB5EB05325F10822AF925E71D1C7B49915EB90
              APIs
              • IsWindowVisible.USER32(?), ref: 00FAB204
              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00FAB221
              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00FAB259
              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00FAB27F
              • _wcsstr.LIBCMT ref: 00FAB289
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
              • String ID:
              • API String ID: 3902887630-0
              • Opcode ID: 68de74bf9c683857b7a69376f925298e62757a0e3124804a21c4e5558e94e810
              • Instruction ID: 4aad7ad303daaa18ed77597b915a6cbaf71ba98e0c939b0ccfbda9a5a41c4fb6
              • Opcode Fuzzy Hash: 68de74bf9c683857b7a69376f925298e62757a0e3124804a21c4e5558e94e810
              • Instruction Fuzzy Hash: 7D21F872605205BAEB165B75DC05F7F7B99DF46720F00813BF809DA192EF65DC40B261
              APIs
                • Part of subcall function 00F52612: GetWindowLongW.USER32(?,000000EB), ref: 00F52623
              • GetWindowLongW.USER32(?,000000F0), ref: 00FDB192
              • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00FDB1B7
              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00FDB1CF
              • GetSystemMetrics.USER32(00000004), ref: 00FDB1F8
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00FC0E90,00000000), ref: 00FDB216
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$Long$MetricsSystem
              • String ID:
              • API String ID: 2294984445-0
              • Opcode ID: 9e4fa0e924996638da384bcef7c9a57d7fef8051d1430c5f105ecec14bdcd05b
              • Instruction ID: 2d12608821963e476f5156ab5cf1dc947e2f075dbf6d472a30e60bd34f57c1d5
              • Opcode Fuzzy Hash: 9e4fa0e924996638da384bcef7c9a57d7fef8051d1430c5f105ecec14bdcd05b
              • Instruction Fuzzy Hash: CE216272910255EFCB119F38DC54B6A37A6FB06371F1A4726BD22D72E0D7309911AB90
              APIs
              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00FA9320
                • Part of subcall function 00F57BCC: _memmove.LIBCMT ref: 00F57C06
              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FA9352
              • __itow.LIBCMT ref: 00FA936A
              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00FA9392
              • __itow.LIBCMT ref: 00FA93A3
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$__itow$_memmove
              • String ID:
              • API String ID: 2983881199-0
              • Opcode ID: b08f329703c2f4ff1b69cd0474fd96b787ba5d911e218c7e80ee3ce48d84a4bf
              • Instruction ID: 05401b920077dc63aba2081dfc8334d3629c0e7a47d5589a667a04ec3a54ab0c
              • Opcode Fuzzy Hash: b08f329703c2f4ff1b69cd0474fd96b787ba5d911e218c7e80ee3ce48d84a4bf
              • Instruction Fuzzy Hash: D821C471B053087BDF10AA609C89EAE3BBDAB49720F048035FE45971C0D6B0C945A792
              APIs
              • IsWindow.USER32(00000000), ref: 00FC5A6E
              • GetForegroundWindow.USER32 ref: 00FC5A85
              • GetDC.USER32(00000000), ref: 00FC5AC1
              • GetPixel.GDI32(00000000,?,00000003), ref: 00FC5ACD
              • ReleaseDC.USER32(00000000,00000003), ref: 00FC5B08
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$ForegroundPixelRelease
              • String ID:
              • API String ID: 4156661090-0
              • Opcode ID: be2321c54371d159bdd5941ec4860fa6b24ee94ae41c6eaa288b288a8a3b75aa
              • Instruction ID: 1256f34aa903b1e3afb9f97bc818ad087998df62bf3e643882e8df5fcbaee169
              • Opcode Fuzzy Hash: be2321c54371d159bdd5941ec4860fa6b24ee94ae41c6eaa288b288a8a3b75aa
              • Instruction Fuzzy Hash: 8421C235A00104AFD704EF65CD85E9AB7E5EF48350F108079F80AC7352CA74ED05EB50
              APIs
              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00F5134D
              • SelectObject.GDI32(?,00000000), ref: 00F5135C
              • BeginPath.GDI32(?), ref: 00F51373
              • SelectObject.GDI32(?,00000000), ref: 00F5139C
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ObjectSelect$BeginCreatePath
              • String ID:
              • API String ID: 3225163088-0
              • Opcode ID: 22a1301d7ce1df97cf9b5f9d74861ea28bd665279c78b02f2f0c3dfbdce7ff4c
              • Instruction ID: a3e04f2607cec6bc0f4c9f07da46186981c8625788ac5ffa86b0366a2e7fd643
              • Opcode Fuzzy Hash: 22a1301d7ce1df97cf9b5f9d74861ea28bd665279c78b02f2f0c3dfbdce7ff4c
              • Instruction Fuzzy Hash: D5219B31C01308EFDB209F25DC08B5D7BE5FB45322F144216FD51AA1A4D77AA899EF50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _memcmp
              • String ID:
              • API String ID: 2931989736-0
              • Opcode ID: 350e556d68d5933865a4cbddc08d1063c5bac7f8b17a3c5b50965446bf168863
              • Instruction ID: 20b19dea095112eff013dfdeb86a310130c163018b0788028110c1b38ffcf73a
              • Opcode Fuzzy Hash: 350e556d68d5933865a4cbddc08d1063c5bac7f8b17a3c5b50965446bf168863
              • Instruction Fuzzy Hash: C10196F26001457BD304AB169D42FBB735CEE53368F148011FD0597243FB54EE24B2A2
              APIs
              • GetCurrentThreadId.KERNEL32 ref: 00FB4ABA
              • __beginthreadex.LIBCMT ref: 00FB4AD8
              • MessageBoxW.USER32(?,?,?,?), ref: 00FB4AED
              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00FB4B03
              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00FB4B0A
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
              • String ID:
              • API String ID: 3824534824-0
              • Opcode ID: 935eb7e08ae1cbd90f605b96f35e401e87b16510834f827075efb8ed857ce210
              • Instruction ID: 80d5d656a9e81401d22a9905542a3c45699b13e673007f6549fab4674667384b
              • Opcode Fuzzy Hash: 935eb7e08ae1cbd90f605b96f35e401e87b16510834f827075efb8ed857ce210
              • Instruction Fuzzy Hash: 98114876905208BFC7109FB99C04EDB7FADEB86320F148266F914D3241D679D9049BA0
              APIs
              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00FA821E
              • GetLastError.KERNEL32(?,00FA7CE2,?,?,?), ref: 00FA8228
              • GetProcessHeap.KERNEL32(00000008,?,?,00FA7CE2,?,?,?), ref: 00FA8237
              • HeapAlloc.KERNEL32(00000000,?,00FA7CE2,?,?,?), ref: 00FA823E
              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00FA8255
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
              • String ID:
              • API String ID: 842720411-0
              • Opcode ID: 2a230d287a228ef5d93d5d78fb6d3fcc2615f00e9e03442cb38e163046d97e16
              • Instruction ID: 93f28807c07b3db03ad79ebfb4ef0ecae7f4fa723124c6bb6f7e5e2b8f7a43d1
              • Opcode Fuzzy Hash: 2a230d287a228ef5d93d5d78fb6d3fcc2615f00e9e03442cb38e163046d97e16
              • Instruction Fuzzy Hash: 5B0162B1601208FFDB104FB5DC48D677BADEF867A4750043AF809C2120DA718D05EA60
              APIs
              • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FA7044,80070057,?,?,?,00FA7455), ref: 00FA7127
              • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FA7044,80070057,?,?), ref: 00FA7142
              • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FA7044,80070057,?,?), ref: 00FA7150
              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FA7044,80070057,?), ref: 00FA7160
              • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00FA7044,80070057,?,?), ref: 00FA716C
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: From$Prog$FreeStringTasklstrcmpi
              • String ID:
              • API String ID: 3897988419-0
              • Opcode ID: 5bfb8e66c6a61221bf8389fb8e9f66782a8b647325b7ea262b9e84c755eb8c32
              • Instruction ID: a379cfc35873d52da0447b08ad55ab355f7924ea5e1c27b69f801689d44f7aaf
              • Opcode Fuzzy Hash: 5bfb8e66c6a61221bf8389fb8e9f66782a8b647325b7ea262b9e84c755eb8c32
              • Instruction Fuzzy Hash: CE017CB2A02308ABDB116F64DC44FAA7BFEEB457A1F144065FD09D2220D731DD40BBA0
              APIs
              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FB5260
              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00FB526E
              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FB5276
              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00FB5280
              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FB52BC
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: PerformanceQuery$CounterSleep$Frequency
              • String ID:
              • API String ID: 2833360925-0
              • Opcode ID: 5fe11885b355109b159cc73e3ffbdcbb095f85559eff386ed91738d9be0cb935
              • Instruction ID: fab4ad75b51e0227ca39338c1d48cba20aecdc29061f261b7f7d1889ebe9d665
              • Opcode Fuzzy Hash: 5fe11885b355109b159cc73e3ffbdcbb095f85559eff386ed91738d9be0cb935
              • Instruction Fuzzy Hash: 79011735D02A1DDBCF00EFE9E949AEDBB78BB09B11F400156E942B2241CB789554ABA1
              APIs
              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FA8121
              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FA812B
              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FA813A
              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FA8141
              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FA8157
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: HeapInformationToken$AllocErrorLastProcess
              • String ID:
              • API String ID: 44706859-0
              • Opcode ID: 5b30d3a581d85987a6abd8983616c02c00349d22e2a908e8f015798beddec368
              • Instruction ID: 82e8be0ee41bc4b623e9ba59d0e2266f715946b72f6b08033abe5c3895c36b32
              • Opcode Fuzzy Hash: 5b30d3a581d85987a6abd8983616c02c00349d22e2a908e8f015798beddec368
              • Instruction Fuzzy Hash: C2F04471601308AFD7110F75DC88E673BADFF467A4B040036F546C6150DAA19946EA60
              APIs
              • GetDlgItem.USER32(?,000003E9), ref: 00FAC1F7
              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00FAC20E
              • MessageBeep.USER32(00000000), ref: 00FAC226
              • KillTimer.USER32(?,0000040A), ref: 00FAC242
              • EndDialog.USER32(?,00000001), ref: 00FAC25C
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: BeepDialogItemKillMessageTextTimerWindow
              • String ID:
              • API String ID: 3741023627-0
              • Opcode ID: c9144cf947d0f424e4b3747f725d309eb7c8773a89262ef316d2a80ceae00569
              • Instruction ID: 7a5442056eb7dfca617a15e7f54e19354c00f4463b4638a87fef84662c2c833b
              • Opcode Fuzzy Hash: c9144cf947d0f424e4b3747f725d309eb7c8773a89262ef316d2a80ceae00569
              • Instruction Fuzzy Hash: D101A771804308A7EB205B60ED4EF9677B9FB01706F00026AA593914E0D7E4A948BB90
              APIs
              • EndPath.GDI32(?), ref: 00F513BF
              • StrokeAndFillPath.GDI32(?,?,00F8B888,00000000,?), ref: 00F513DB
              • SelectObject.GDI32(?,00000000), ref: 00F513EE
              • DeleteObject.GDI32 ref: 00F51401
              • StrokePath.GDI32(?), ref: 00F5141C
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Path$ObjectStroke$DeleteFillSelect
              • String ID:
              • API String ID: 2625713937-0
              • Opcode ID: 165ad95ddaeaa8ad94e72167f6f01c9c919346708a9f9d4e26d73a06a95382a1
              • Instruction ID: 53858d80e880f56ba505650483d284c0a428458c1143435369c795752553aa2b
              • Opcode Fuzzy Hash: 165ad95ddaeaa8ad94e72167f6f01c9c919346708a9f9d4e26d73a06a95382a1
              • Instruction Fuzzy Hash: C9F0E130405308DBDB215F2AEC4CB583FA5BB42326F18C225ED6A5D4F5C73A5599EF50
              APIs
              • CoInitialize.OLE32(00000000), ref: 00FBC432
              • CoCreateInstance.OLE32(00FE2D6C,00000000,00000001,00FE2BDC,?), ref: 00FBC44A
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
              • CoUninitialize.OLE32 ref: 00FBC6B7
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CreateInitializeInstanceUninitialize_memmove
              • String ID: .lnk
              • API String ID: 2683427295-24824748
              • Opcode ID: bf1e5f54ae1e9b62a0b3b7c8cae435acbf2a8e6e6b27d556d0e542e46177522f
              • Instruction ID: f33166db5288e499887154998dfc41be3a30982d730bf92413d1c14b42816cde
              • Opcode Fuzzy Hash: bf1e5f54ae1e9b62a0b3b7c8cae435acbf2a8e6e6b27d556d0e542e46177522f
              • Instruction Fuzzy Hash: 96A15BB1108205AFD304EF64CC81EABB7E8FF85355F00491CF6559B1A2EBB5EA09DB52
              APIs
                • Part of subcall function 00F70DB6: std::exception::exception.LIBCMT ref: 00F70DEC
                • Part of subcall function 00F70DB6: __CxxThrowException@8.LIBCMT ref: 00F70E01
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
                • Part of subcall function 00F57A51: _memmove.LIBCMT ref: 00F57AAB
              • __swprintf.LIBCMT ref: 00F62ECD
              Strings
              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00F62D66
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
              • API String ID: 1943609520-557222456
              • Opcode ID: a2fec30f06965463b914a6c960bea07728c3e8b6a819e4f876a73aa9905cff7d
              • Instruction ID: 0d60484f4adf13a2b6c8702dfe988f966d95ee77d02f04551c2d82bbdeb5c93c
              • Opcode Fuzzy Hash: a2fec30f06965463b914a6c960bea07728c3e8b6a819e4f876a73aa9905cff7d
              • Instruction Fuzzy Hash: 64919D715087019FDB14EF24DC85C6EB7B8EF95710F00491DF9859B2A1EA38ED48EB52
              APIs
                • Part of subcall function 00F54750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00F54743,?,?,00F537AE,?), ref: 00F54770
              • CoInitialize.OLE32(00000000), ref: 00FBB9BB
              • CoCreateInstance.OLE32(00FE2D6C,00000000,00000001,00FE2BDC,?), ref: 00FBB9D4
              • CoUninitialize.OLE32 ref: 00FBB9F1
                • Part of subcall function 00F59837: __itow.LIBCMT ref: 00F59862
                • Part of subcall function 00F59837: __swprintf.LIBCMT ref: 00F598AC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
              • String ID: .lnk
              • API String ID: 2126378814-24824748
              • Opcode ID: 056c3ddd04dbc268e28b64d6ae5ae5fd8d58185b085771a2d8101ab3334a2d43
              • Instruction ID: 7f10b6648b612db4b58d70f1975fed3482f9af7d5a524ba529655c3fe3d4701f
              • Opcode Fuzzy Hash: 056c3ddd04dbc268e28b64d6ae5ae5fd8d58185b085771a2d8101ab3334a2d43
              • Instruction Fuzzy Hash: F3A16474A043019FCB04DF15C880D5ABBE5FF89325F048988F9999B3A2CB75EC49DB91
              APIs
              • __startOneArgErrorHandling.LIBCMT ref: 00F750AD
                • Part of subcall function 00F800F0: __87except.LIBCMT ref: 00F8012B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ErrorHandling__87except__start
              • String ID: pow
              • API String ID: 2905807303-2276729525
              • Opcode ID: 918bcc4cc3dddb499a6a2c6f6046937458a33ee1835120ed79c0bde6da619b11
              • Instruction ID: c6efc2219b11596f27b8a726cb807ad8f35052764b84f56c5de193cc5403742f
              • Opcode Fuzzy Hash: 918bcc4cc3dddb499a6a2c6f6046937458a33ee1835120ed79c0bde6da619b11
              • Instruction Fuzzy Hash: 2B517E21D0CA0286DB517728CC453AE3B949B41B30FB0CD5AE4D986299DFB88DDCB783
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _memset$_memmove
              • String ID: ERCP
              • API String ID: 2532777613-1384759551
              • Opcode ID: 49178af49c726a0d39aef3bfc6074d1225ca52ad3267bd4390043e04448c334e
              • Instruction ID: bb14d465a1fc5721e4863e09b4ff03d8f5bf64e5c96543e4855107fa4e64826a
              • Opcode Fuzzy Hash: 49178af49c726a0d39aef3bfc6074d1225ca52ad3267bd4390043e04448c334e
              • Instruction Fuzzy Hash: A851B071D00705DBDB24DF65C991BAABBF4EF44314F20856EE94ACB291EB34EA44EB40
              APIs
                • Part of subcall function 00FB14BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FA9296,?,?,00000034,00000800,?,00000034), ref: 00FB14E6
              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00FA983F
                • Part of subcall function 00FB1487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00FA92C5,?,?,00000800,?,00001073,00000000,?,?), ref: 00FB14B1
                • Part of subcall function 00FB13DE: GetWindowThreadProcessId.USER32(?,?), ref: 00FB1409
                • Part of subcall function 00FB13DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00FA925A,00000034,?,?,00001004,00000000,00000000), ref: 00FB1419
                • Part of subcall function 00FB13DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00FA925A,00000034,?,?,00001004,00000000,00000000), ref: 00FB142F
              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FA98AC
              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00FA98F9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
              • String ID: @
              • API String ID: 4150878124-2766056989
              • Opcode ID: d98ce645050bc814341c965f7f259f75b5470e3314a17048416ef2ac3ac8e41b
              • Instruction ID: 3365649112067f98059a35cecbcb63c07fdd516e23ca95ed52f33656cf1016e8
              • Opcode Fuzzy Hash: d98ce645050bc814341c965f7f259f75b5470e3314a17048416ef2ac3ac8e41b
              • Instruction Fuzzy Hash: FA415E7690121CBFCB10DFA4CC91ADEBBB8EB0A300F0040A9F945B7181DA746E49DFA0
              APIs
              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00FDF910,00000000,?,?,?,?), ref: 00FD79DF
              • GetWindowLongW.USER32 ref: 00FD79FC
              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00FD7A0C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$Long
              • String ID: SysTreeView32
              • API String ID: 847901565-1698111956
              • Opcode ID: 1cef7dcd6870f1c42e430e248b5385bb8aea7ba3996b90a84c6a0cd7a2d82257
              • Instruction ID: d7c7b4d58b6cc09f63efaf552b64359aa52d8fcff028acb21bd34bcedad14eaa
              • Opcode Fuzzy Hash: 1cef7dcd6870f1c42e430e248b5385bb8aea7ba3996b90a84c6a0cd7a2d82257
              • Instruction Fuzzy Hash: 0E31F032604206ABDB119F38CC41BEA77AAFB05334F284726F875972E0E735E950AB50
              APIs
              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00FD7461
              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00FD7475
              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00FD7499
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$Window
              • String ID: SysMonthCal32
              • API String ID: 2326795674-1439706946
              • Opcode ID: 4c01b9730b68fba1a38140510c5a9c8d82b9060449dac49bcf9e2e92772c6041
              • Instruction ID: e8c32afe9dc4d2c4c79a952798cc15110fe6985f3f7dcfe62ec84700ce89c401
              • Opcode Fuzzy Hash: 4c01b9730b68fba1a38140510c5a9c8d82b9060449dac49bcf9e2e92772c6041
              • Instruction Fuzzy Hash: 4221B132500218ABDF12DE64CC42FEA3B6AEB49724F150215FE556B1D0DA75AC54ABA0
              APIs
              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00FD7C4A
              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00FD7C58
              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00FD7C5F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$DestroyWindow
              • String ID: msctls_updown32
              • API String ID: 4014797782-2298589950
              • Opcode ID: 246f95436678025cddbd762045c94e200f689712402749925741f8b56c94079d
              • Instruction ID: a351d91f0a34c34f941a96395ed59e45f304c2054a86ae997dfc8bb731917399
              • Opcode Fuzzy Hash: 246f95436678025cddbd762045c94e200f689712402749925741f8b56c94079d
              • Instruction Fuzzy Hash: 422141B5604208AFDB11EF24DCC1D6737EDEB4A364B14005AF9059F361DB75EC119B60
              APIs
              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00FD6D3B
              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00FD6D4B
              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00FD6D70
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$MoveWindow
              • String ID: Listbox
              • API String ID: 3315199576-2633736733
              • Opcode ID: df32abcb7192f69f797fbea651fffcb048ad4b002ad79ceeb7dc514d6aa1d179
              • Instruction ID: 5fc6a01181b14792abe43d0d53142e23365fa810edb7b00896358f2610538416
              • Opcode Fuzzy Hash: df32abcb7192f69f797fbea651fffcb048ad4b002ad79ceeb7dc514d6aa1d179
              • Instruction Fuzzy Hash: 8C210432A11118BFDF118F54DC41FBB3BBBEF89760F058129F9459B290CA719C51ABA0
              APIs
              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00FD7772
              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00FD7787
              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00FD7794
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: msctls_trackbar32
              • API String ID: 3850602802-1010561917
              • Opcode ID: 47c59bd3a7c0daa93f0c8d3dfd6868efb6f444f828f9e0c7a658e8ecfb10266a
              • Instruction ID: 09bc8fd07376802dd73c23e7ad01114ab2bf711374edff4677c7e70c61508d4a
              • Opcode Fuzzy Hash: 47c59bd3a7c0daa93f0c8d3dfd6868efb6f444f828f9e0c7a658e8ecfb10266a
              • Instruction Fuzzy Hash: C3112732600308BEEF206F61CC01FDB776AEF88B64F054519FA459A190D672E811EB10
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,?,00F54B83,?), ref: 00F54C44
              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00F54C56
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
              • API String ID: 2574300362-1355242751
              • Opcode ID: 6f1132aa5cda18769db0f77feffb8eaac0b5f80678658abd272216de915a84da
              • Instruction ID: a5d2daccafc3d05fdea336d686689aa6f25d7c429f6a26300ae26ee1b89fd90d
              • Opcode Fuzzy Hash: 6f1132aa5cda18769db0f77feffb8eaac0b5f80678658abd272216de915a84da
              • Instruction Fuzzy Hash: A9D0C230901313CFD7204F31C80CA4673D5AF0035AB14883F99A2C6164E770D4C4DA10
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,?,00F54BD0,?,00F54DEF,?,010152F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00F54C11
              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00F54C23
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
              • API String ID: 2574300362-3689287502
              • Opcode ID: c15c2cf116a0ada7a6745ecd60c83efd9d93198baa8b10c375d4123f9faf5f82
              • Instruction ID: ba405769a253ff5ca99a8cf1bec757907993ada9245e501a0b7345828a21dcd4
              • Opcode Fuzzy Hash: c15c2cf116a0ada7a6745ecd60c83efd9d93198baa8b10c375d4123f9faf5f82
              • Instruction Fuzzy Hash: 6FD0EC31911713CFD7205B71D908A06B6E6AF49256B15883B98D6D6250E6B0D4849A51
              APIs
              • LoadLibraryA.KERNEL32(advapi32.dll,?,00FD1039), ref: 00FD0DF5
              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00FD0E07
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: RegDeleteKeyExW$advapi32.dll
              • API String ID: 2574300362-4033151799
              • Opcode ID: a009b1e8a6e23040504b8e18e7f67fd5a963e2c69ab76a64d57e94b4b9d4393f
              • Instruction ID: d39c7024b4062ff049fc029503598670fff10e7c32aea07ee795950f8f4fb23e
              • Opcode Fuzzy Hash: a009b1e8a6e23040504b8e18e7f67fd5a963e2c69ab76a64d57e94b4b9d4393f
              • Instruction Fuzzy Hash: 6FD0C231800317CFD3204F72C80874673D6AF00256F048C3F94C6C6250DBB1D490D701
              APIs
              • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00FC8CF4,?,00FDF910), ref: 00FC90EE
              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00FC9100
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: GetModuleHandleExW$kernel32.dll
              • API String ID: 2574300362-199464113
              • Opcode ID: 62208c30ae94f9bbee84f5ec3d75aeea6595f82aaf3aa71c6b66af220832c91d
              • Instruction ID: 9d0c08d1efacfc9643bab2d819f3e6eace4300abb92aad7967e2c65561b5f0ac
              • Opcode Fuzzy Hash: 62208c30ae94f9bbee84f5ec3d75aeea6595f82aaf3aa71c6b66af220832c91d
              • Instruction Fuzzy Hash: FBD01735914713CFDB209F31D91EA0676E6AF053A5B1AC83F9496D6690E7B0C884EA90
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: LocalTime__swprintf
              • String ID: %.3d$WIN_XPe
              • API String ID: 2070861257-2409531811
              • Opcode ID: a784cc75b48d18a1eb5d7311f1e7fab2c6e61bfa97a8f0c9baa0288213ec1a3e
              • Instruction ID: 8c8755241ee7afaf950bcd3c4e4091122ae42a493160260314caeedc8ab07548
              • Opcode Fuzzy Hash: a784cc75b48d18a1eb5d7311f1e7fab2c6e61bfa97a8f0c9baa0288213ec1a3e
              • Instruction Fuzzy Hash: 96D0127380510BFADF059AD09C88EF9777CB708701F500476F90792040E2258798F622
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: cc0a3bb1d976e2c80852e6e4e60896cc3b1adfdc6c9ef951d6b51c7229a28a29
              • Instruction ID: 9a25b00fc3091108325ad3fb124750f56c19309226669edd72eab159caeaf9d0
              • Opcode Fuzzy Hash: cc0a3bb1d976e2c80852e6e4e60896cc3b1adfdc6c9ef951d6b51c7229a28a29
              • Instruction Fuzzy Hash: 32C16AB5A04316EFCB14DFA4C884EAEBBB5FF49310B158599E805EB251D730ED81EB90
              APIs
              • CharLowerBuffW.USER32(?,?), ref: 00FCE0BE
              • CharLowerBuffW.USER32(?,?), ref: 00FCE101
                • Part of subcall function 00FCD7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00FCD7C5
              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00FCE301
              • _memmove.LIBCMT ref: 00FCE314
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: BuffCharLower$AllocVirtual_memmove
              • String ID:
              • API String ID: 3659485706-0
              • Opcode ID: 80f3f769f3c29cef27d650d6878df8784c8eaadf98c9a08ce5537d0c6b9175c0
              • Instruction ID: f51ca6efff39454c78ddf11df03641c0d71684309b9ef4143e33bb79c2347e66
              • Opcode Fuzzy Hash: 80f3f769f3c29cef27d650d6878df8784c8eaadf98c9a08ce5537d0c6b9175c0
              • Instruction Fuzzy Hash: FEC16971A08302CFC714DF28C981A6ABBE4FF89714F04896EF8999B351D735E905DB82
              APIs
              • CoInitialize.OLE32(00000000), ref: 00FC80C3
              • CoUninitialize.OLE32 ref: 00FC80CE
                • Part of subcall function 00FAD56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00FAD5D4
              • VariantInit.OLEAUT32(?), ref: 00FC80D9
              • VariantClear.OLEAUT32(?), ref: 00FC83AA
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
              • String ID:
              • API String ID: 780911581-0
              • Opcode ID: 6c7e216bdd21909e71fa82a6e5163d67431fa3634b83017479261b1cb5d51a26
              • Instruction ID: e1b19f08e8344d02d6cc387de1879d2dcfe8d0dd605fc12d6adef34720711893
              • Opcode Fuzzy Hash: 6c7e216bdd21909e71fa82a6e5163d67431fa3634b83017479261b1cb5d51a26
              • Instruction Fuzzy Hash: 12A136356087029FCB04DF54C986B6AB7E4BF89364F18440DFA969B3A1CB74ED05EB42
              APIs
              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00FE2C7C,?), ref: 00FA76EA
              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00FE2C7C,?), ref: 00FA7702
              • CLSIDFromProgID.OLE32(?,?,00000000,00FDFB80,000000FF,?,00000000,00000800,00000000,?,00FE2C7C,?), ref: 00FA7727
              • _memcmp.LIBCMT ref: 00FA7748
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: FromProg$FreeTask_memcmp
              • String ID:
              • API String ID: 314563124-0
              • Opcode ID: 2bd4b021a201bb4beab110098301ec2b2233817a64e0b5b6e668e01f4ee6b538
              • Instruction ID: f9143043108b7ce7d867cbade43c3d9df3638bc0a97b86dbba514ed28f843f7e
              • Opcode Fuzzy Hash: 2bd4b021a201bb4beab110098301ec2b2233817a64e0b5b6e668e01f4ee6b538
              • Instruction Fuzzy Hash: 6D811D75A00209EFCB04DFA4C984EEEB7B9FF89315F204559E506AB250DB71AE06DB60
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Variant$AllocClearCopyInitString
              • String ID:
              • API String ID: 2808897238-0
              • Opcode ID: 101d7d5bfaabc643514cd254ea106e308daad618f8ccddcdd1c8ab16db6cbd9a
              • Instruction ID: 96fa69db584fd835446fb88364f25f49ee137cf567e43d1e0789b1aa375994ee
              • Opcode Fuzzy Hash: 101d7d5bfaabc643514cd254ea106e308daad618f8ccddcdd1c8ab16db6cbd9a
              • Instruction Fuzzy Hash: E651F4B5714301DADB24EF65C891B2AB3E9AF5A310F28C81FE586DB291DF7CD844A701
              APIs
              • GetWindowRect.USER32(0117DD08,?), ref: 00FD9863
              • ScreenToClient.USER32(00000002,00000002), ref: 00FD9896
              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00FD9903
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$ClientMoveRectScreen
              • String ID:
              • API String ID: 3880355969-0
              • Opcode ID: d2ee429ced94c91a7ec3a252cef0fdcd27b2aea88c429314ca129af5e2258443
              • Instruction ID: bfbff62974c5825c1fbc9e670044785a6a43c882e98435b986f439dfe838188e
              • Opcode Fuzzy Hash: d2ee429ced94c91a7ec3a252cef0fdcd27b2aea88c429314ca129af5e2258443
              • Instruction Fuzzy Hash: C0513034A04209EFCF10CF68C894AAE7BB6FF45760F58825AF8659B390D771AD41EB50
              APIs
              • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00FA9AD2
              • __itow.LIBCMT ref: 00FA9B03
                • Part of subcall function 00FA9D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00FA9DBE
              • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00FA9B6C
              • __itow.LIBCMT ref: 00FA9BC3
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend$__itow
              • String ID:
              • API String ID: 3379773720-0
              • Opcode ID: 662b58332555b8c6f0d43315f8f56a57b195b1e696e589e62b9290a2b52c7dd1
              • Instruction ID: ecc9b56c19d613af802df040a23ac5171c15286abfc2018bd2b86f9291c29be1
              • Opcode Fuzzy Hash: 662b58332555b8c6f0d43315f8f56a57b195b1e696e589e62b9290a2b52c7dd1
              • Instruction Fuzzy Hash: E841C4B0A04308ABDF11EF54DC45BEE7BB9EF85761F000029FD05A7291DBB49A48EB61
              APIs
              • socket.WSOCK32(00000002,00000002,00000011), ref: 00FC69D1
              • WSAGetLastError.WSOCK32(00000000), ref: 00FC69E1
                • Part of subcall function 00F59837: __itow.LIBCMT ref: 00F59862
                • Part of subcall function 00F59837: __swprintf.LIBCMT ref: 00F598AC
              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00FC6A45
              • WSAGetLastError.WSOCK32(00000000), ref: 00FC6A51
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ErrorLast$__itow__swprintfsocket
              • String ID:
              • API String ID: 2214342067-0
              • Opcode ID: 2653ac2a63da7371c1f7ae3cbe483bd2e3ae0e98993e67e65a16c0699dbe571f
              • Instruction ID: 75bda2acbf4c290d98fbc1405c078f429ac911550ee61f4040fa3f2a07c7885c
              • Opcode Fuzzy Hash: 2653ac2a63da7371c1f7ae3cbe483bd2e3ae0e98993e67e65a16c0699dbe571f
              • Instruction Fuzzy Hash: A141AE75744200AFEB64AF24CC87F2A77E49F04B15F44841CFE19AF2D2DAB89D05AB91
              APIs
              • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00FDF910), ref: 00FC64A7
              • _strlen.LIBCMT ref: 00FC64D9
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _strlen
              • String ID:
              • API String ID: 4218353326-0
              • Opcode ID: 0785db9e532d7a500a20aace5357f0d58a5276c7be624c0e0ffc967a2b9fa152
              • Instruction ID: 8f91af1ee6b8baf1f1187aa5d181b9031e6538c1a39f65de660d8c385a26589a
              • Opcode Fuzzy Hash: 0785db9e532d7a500a20aace5357f0d58a5276c7be624c0e0ffc967a2b9fa152
              • Instruction Fuzzy Hash: 66412971904105AFCB14EBA4DD96FAEB7A9AF04310F248119FD1AD7292DB38ED04EB51
              APIs
              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00FBB89E
              • GetLastError.KERNEL32(?,00000000), ref: 00FBB8C4
              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00FBB8E9
              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00FBB915
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CreateHardLink$DeleteErrorFileLast
              • String ID:
              • API String ID: 3321077145-0
              • Opcode ID: cf4065388abc430c7ac250c14d820fc0dd1f4e1137fee0a6ac645b386fc96d9a
              • Instruction ID: e67374ab5a492e312c1229a11f2a831c1cef3337900bc16efefeb6f8689818d5
              • Opcode Fuzzy Hash: cf4065388abc430c7ac250c14d820fc0dd1f4e1137fee0a6ac645b386fc96d9a
              • Instruction Fuzzy Hash: E2413A35A00910DFCB14EF15C884A5DBBE1AF89321F598098ED4A9B362CB74FD05EF91
              APIs
              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00FD88DE
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: InvalidateRect
              • String ID:
              • API String ID: 634782764-0
              • Opcode ID: 3225726629eb64f75d390ac179d582380b26433bc93afc054143d07094c40148
              • Instruction ID: 50f96a13855a7aaa114b61f4f2f484cd5dd763b1d9346878742e5c5f58c0c306
              • Opcode Fuzzy Hash: 3225726629eb64f75d390ac179d582380b26433bc93afc054143d07094c40148
              • Instruction Fuzzy Hash: 6831E531A00108AFEB219B28CC55FBC3767EB067A0F9C4113FA91E63A1CA35D942B753
              APIs
              • ClientToScreen.USER32(?,?), ref: 00FDAB60
              • GetWindowRect.USER32(?,?), ref: 00FDABD6
              • PtInRect.USER32(?,?,00FDC014), ref: 00FDABE6
              • MessageBeep.USER32(00000000), ref: 00FDAC57
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Rect$BeepClientMessageScreenWindow
              • String ID:
              • API String ID: 1352109105-0
              • Opcode ID: 6c95b654c4bed6a7d940ed4fe68be8c7fb036f8d45cb3528cbeeefcab4a74602
              • Instruction ID: 8de859732b8ad1868516a1f7126ce6bdb90b64e902bebccc7821b4bc431c16f6
              • Opcode Fuzzy Hash: 6c95b654c4bed6a7d940ed4fe68be8c7fb036f8d45cb3528cbeeefcab4a74602
              • Instruction Fuzzy Hash: 7D41A230A10108DFCB21CF58C884B5977F6FB89320F1C80A6E8559F354C735E842EB56
              APIs
              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00FB0B27
              • SetKeyboardState.USER32(00000080,?,00000001), ref: 00FB0B43
              • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00FB0BA9
              • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00FB0BFB
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: KeyboardState$InputMessagePostSend
              • String ID:
              • API String ID: 432972143-0
              • Opcode ID: 3989ffec129ada1e9e221687f8a516359946cbaaf321ba70eda5857708accad8
              • Instruction ID: 49ced486a04fe1f0e33c68dabe7b768214c04461948a1a757755d9c2d05dd541
              • Opcode Fuzzy Hash: 3989ffec129ada1e9e221687f8a516359946cbaaf321ba70eda5857708accad8
              • Instruction Fuzzy Hash: C9310970D402186EFB348A67CC05BFBBBA5AB85334F08C35AE591D11E1CB758944BB55
              APIs
              • GetKeyboardState.USER32(?,7608C0D0,?,00008000), ref: 00FB0C66
              • SetKeyboardState.USER32(00000080,?,00008000), ref: 00FB0C82
              • PostMessageW.USER32(00000000,00000101,00000000), ref: 00FB0CE1
              • SendInput.USER32(00000001,?,0000001C,7608C0D0,?,00008000), ref: 00FB0D33
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: KeyboardState$InputMessagePostSend
              • String ID:
              • API String ID: 432972143-0
              • Opcode ID: 7e97fb4e9808462dde7aa29a62d9dc2dd1d44bf5528eb2d056fa03d6b332640a
              • Instruction ID: 54796a64a114f677b8d92407ecd4a50ed0decac6ffbbd2c362e6a5867c8530f7
              • Opcode Fuzzy Hash: 7e97fb4e9808462dde7aa29a62d9dc2dd1d44bf5528eb2d056fa03d6b332640a
              • Instruction Fuzzy Hash: A33126B0E402186EFF308A668C14BFFBF66AB49330F08431BE485621D1DF399949BB55
              APIs
              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00F861FB
              • __isleadbyte_l.LIBCMT ref: 00F86229
              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00F86257
              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00F8628D
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
              • String ID:
              • API String ID: 3058430110-0
              • Opcode ID: a20d444be2d18e99261860b35da6ae42514be4273cda876cfdfa94dfcc8c6ef9
              • Instruction ID: 57bfaf8e77819d31c053d1b8d4c66743c1d4b55f8be2b74e8f24a7992ab5ca1f
              • Opcode Fuzzy Hash: a20d444be2d18e99261860b35da6ae42514be4273cda876cfdfa94dfcc8c6ef9
              • Instruction Fuzzy Hash: 2B31D031A00246AFDF21AF74CC49BEA7BAAFF41320F154069F824D71A1D730E950EB90
              APIs
              • GetForegroundWindow.USER32 ref: 00FD4F02
                • Part of subcall function 00FB3641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00FB365B
                • Part of subcall function 00FB3641: GetCurrentThreadId.KERNEL32 ref: 00FB3662
                • Part of subcall function 00FB3641: AttachThreadInput.USER32(00000000,?,00FB5005), ref: 00FB3669
              • GetCaretPos.USER32(?), ref: 00FD4F13
              • ClientToScreen.USER32(00000000,?), ref: 00FD4F4E
              • GetForegroundWindow.USER32 ref: 00FD4F54
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
              • String ID:
              • API String ID: 2759813231-0
              • Opcode ID: 7369f11390b3d6b30935f1ee8dfac2c2af3ebf43a122c5a6c2ae28e93c7a8e66
              • Instruction ID: e6962122623c6eef5b1bcdfbbf676887b2227cc1fb868221e4964ed9ce2a35bc
              • Opcode Fuzzy Hash: 7369f11390b3d6b30935f1ee8dfac2c2af3ebf43a122c5a6c2ae28e93c7a8e66
              • Instruction Fuzzy Hash: 6B311A71D00108AFCB04EFB5CC86DEFB7F9EF88300B14406AE915E7241DA75AE099BA0
              APIs
              • CreateToolhelp32Snapshot.KERNEL32 ref: 00FB3C7A
              • Process32FirstW.KERNEL32(00000000,?), ref: 00FB3C88
              • Process32NextW.KERNEL32(00000000,?), ref: 00FB3CA8
              • CloseHandle.KERNEL32(00000000), ref: 00FB3D52
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
              • String ID:
              • API String ID: 420147892-0
              • Opcode ID: aa591b33a7bf10cab9b2efb7c8eb5d4d33f20dd016bd2ff593f0a0dc31eabe64
              • Instruction ID: ecdfcb03bf26f50e3b90604aa2f55e92469f15ab6f3b0cb8ad74d843246808c3
              • Opcode Fuzzy Hash: aa591b33a7bf10cab9b2efb7c8eb5d4d33f20dd016bd2ff593f0a0dc31eabe64
              • Instruction Fuzzy Hash: 5631B3711083059FC300EF61DC81EAFBBE8AF89354F50092DF982861A1EB759A4DDB52
              APIs
                • Part of subcall function 00F52612: GetWindowLongW.USER32(?,000000EB), ref: 00F52623
              • GetCursorPos.USER32(?), ref: 00FDC4D2
              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00F8B9AB,?,?,?,?,?), ref: 00FDC4E7
              • GetCursorPos.USER32(?), ref: 00FDC534
              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00F8B9AB,?,?,?), ref: 00FDC56E
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Cursor$LongMenuPopupProcTrackWindow
              • String ID:
              • API String ID: 2864067406-0
              • Opcode ID: aa1de5aa4eed09a65888d6ca4f849d09a51df453b553de1f35113ecb219f07e7
              • Instruction ID: bbc534bbc75fee864cb68a85a779d584f1ce8e4912714c7ec675e153c67bfcce
              • Opcode Fuzzy Hash: aa1de5aa4eed09a65888d6ca4f849d09a51df453b553de1f35113ecb219f07e7
              • Instruction Fuzzy Hash: D131C335600018AFCB26CF98D858FAA7BB6EB4A320F484156F9058B361C735AD50EBE4
              APIs
                • Part of subcall function 00FA810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00FA8121
                • Part of subcall function 00FA810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00FA812B
                • Part of subcall function 00FA810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FA813A
                • Part of subcall function 00FA810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00FA8141
                • Part of subcall function 00FA810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00FA8157
              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00FA86A3
              • _memcmp.LIBCMT ref: 00FA86C6
              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00FA86FC
              • HeapFree.KERNEL32(00000000), ref: 00FA8703
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
              • String ID:
              • API String ID: 1592001646-0
              • Opcode ID: 9ac55c6f17cbf2bfd482388ffb41e722345113a7cd39c5c738478a5912834c43
              • Instruction ID: 561efafc3521e6ff8b9229da4562c5c02057f7817b237586889a20889ce664d2
              • Opcode Fuzzy Hash: 9ac55c6f17cbf2bfd482388ffb41e722345113a7cd39c5c738478a5912834c43
              • Instruction Fuzzy Hash: D321B0B1E01108EFEB00DFA4CA48BEEB7B8FF46354F148059E405A7241DB70AE06EB60
              APIs
              • __setmode.LIBCMT ref: 00F709AE
                • Part of subcall function 00F55A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FB7896,?,?,00000000), ref: 00F55A2C
                • Part of subcall function 00F55A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FB7896,?,?,00000000,?,?), ref: 00F55A50
              • _fprintf.LIBCMT ref: 00F709E5
              • OutputDebugStringW.KERNEL32(?), ref: 00FA5DBB
                • Part of subcall function 00F74AAA: _flsall.LIBCMT ref: 00F74AC3
              • __setmode.LIBCMT ref: 00F70A1A
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
              • String ID:
              • API String ID: 521402451-0
              • Opcode ID: ca522b845fbdea0042b3683e5ce89a7451021fa5d3de7e65d41dc06b1a30d24c
              • Instruction ID: d3a2e6fb92a5403130a269deeb815132191c169663ea6b547e54a64d734a3ed4
              • Opcode Fuzzy Hash: ca522b845fbdea0042b3683e5ce89a7451021fa5d3de7e65d41dc06b1a30d24c
              • Instruction Fuzzy Hash: 9B113D72904104AFDB04B7B49C469FD7768AF82321F248157F60957182EF7C6846B7A2
              APIs
              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00FC17A3
                • Part of subcall function 00FC182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00FC184C
                • Part of subcall function 00FC182D: InternetCloseHandle.WININET(00000000), ref: 00FC18E9
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Internet$CloseConnectHandleOpen
              • String ID:
              • API String ID: 1463438336-0
              • Opcode ID: 37da44d4cd0761eb4d656e65adb588ec8ad5da040e209e904ac51626c9466a3f
              • Instruction ID: ca0fd2ccec800d9bffd5be0962e2a4ca499dc166afb6f4e6f5e102a36b57b19b
              • Opcode Fuzzy Hash: 37da44d4cd0761eb4d656e65adb588ec8ad5da040e209e904ac51626c9466a3f
              • Instruction Fuzzy Hash: 3C21F932604606BFEB129F60CD02FBBBBAAFF49710F14402EF90596592D771D825B790
              APIs
              • GetFileAttributesW.KERNEL32(?,00FDFAC0), ref: 00FB3A64
              • GetLastError.KERNEL32 ref: 00FB3A73
              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00FB3A82
              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00FDFAC0), ref: 00FB3ADF
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CreateDirectory$AttributesErrorFileLast
              • String ID:
              • API String ID: 2267087916-0
              • Opcode ID: a782d5f73d22279ee7d8f63ee42929328341b241e49defc4095aaaebb766df72
              • Instruction ID: 44aa7fde415d97fae390a0fb3f5fda32821feabfe0ada5f2b68f9efa648c4980
              • Opcode Fuzzy Hash: a782d5f73d22279ee7d8f63ee42929328341b241e49defc4095aaaebb766df72
              • Instruction Fuzzy Hash: C721D6785482058F8300EF29D8818AA77E8AF55364F244A1EF4DAC72A1D735DE09EF42
              APIs
                • Part of subcall function 00FAF0BC: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00FADCD3,?,?,?,00FAEAC6,00000000,000000EF,00000119,?,?), ref: 00FAF0CB
                • Part of subcall function 00FAF0BC: lstrcpyW.KERNEL32(00000000,?,?,00FADCD3,?,?,?,00FAEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FAF0F1
                • Part of subcall function 00FAF0BC: lstrcmpiW.KERNEL32(00000000,?,00FADCD3,?,?,?,00FAEAC6,00000000,000000EF,00000119,?,?), ref: 00FAF122
              • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00FAEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FADCEC
              • lstrcpyW.KERNEL32(00000000,?,?,00FAEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FADD12
              • lstrcmpiW.KERNEL32(00000002,cdecl,?,00FAEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00FADD46
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: lstrcmpilstrcpylstrlen
              • String ID: cdecl
              • API String ID: 4031866154-3896280584
              • Opcode ID: e3006117a28dbc30839d78f9d51c299e09cb544e8802a31e8e550ebcd3a1b1ed
              • Instruction ID: 9267ec0e71c9da3881173b39d887821e66d54a00e5505da262f1cdf3481b243e
              • Opcode Fuzzy Hash: e3006117a28dbc30839d78f9d51c299e09cb544e8802a31e8e550ebcd3a1b1ed
              • Instruction Fuzzy Hash: 0D11D07A200305EBCB25AF74CC45D7A77A9FF46320B40802AF807CB2A0EB719C41E791
              APIs
              • _free.LIBCMT ref: 00F85101
                • Part of subcall function 00F7571C: __FF_MSGBANNER.LIBCMT ref: 00F75733
                • Part of subcall function 00F7571C: __NMSG_WRITE.LIBCMT ref: 00F7573A
                • Part of subcall function 00F7571C: RtlAllocateHeap.NTDLL(01160000,00000000,00000001,00000000,?,?,?,00F70DD3,?), ref: 00F7575F
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: AllocateHeap_free
              • String ID:
              • API String ID: 614378929-0
              • Opcode ID: 101061d8b08a64d8e43e50fbe61b080c0166b82832e408ed56468f91509352fc
              • Instruction ID: 71055f20e50b16729e4975674099b4f27112304e6ac7242a1f849bd05c3f65fd
              • Opcode Fuzzy Hash: 101061d8b08a64d8e43e50fbe61b080c0166b82832e408ed56468f91509352fc
              • Instruction Fuzzy Hash: 8111CE72901E15ABCF313F74AC0DBDE3798AB40BB1B10852BF9099A160DE388841B791
              APIs
              • _memset.LIBCMT ref: 00F544CF
                • Part of subcall function 00F5407C: _memset.LIBCMT ref: 00F540FC
                • Part of subcall function 00F5407C: _wcscpy.LIBCMT ref: 00F54150
                • Part of subcall function 00F5407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F54160
              • KillTimer.USER32(?,00000001,?,?), ref: 00F54524
              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F54533
              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F8D4B9
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
              • String ID:
              • API String ID: 1378193009-0
              • Opcode ID: d5e8eed36beae905f50f81eff2a6e7e4abed07ca0d053da963bfe1430dc15ecd
              • Instruction ID: 3b3a99e9540aa19aebb4b593f118fa01b2a3701772a6ac1657e57fba0b516f16
              • Opcode Fuzzy Hash: d5e8eed36beae905f50f81eff2a6e7e4abed07ca0d053da963bfe1430dc15ecd
              • Instruction Fuzzy Hash: 06210771904784AFE732DB24CC45BE6BBEC9F02319F04009EE78E56181D3742988EB41
              APIs
                • Part of subcall function 00F55A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00FB7896,?,?,00000000), ref: 00F55A2C
                • Part of subcall function 00F55A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00FB7896,?,?,00000000,?,?), ref: 00F55A50
              • gethostbyname.WSOCK32(?,?,?), ref: 00FC6399
              • WSAGetLastError.WSOCK32(00000000), ref: 00FC63A4
              • _memmove.LIBCMT ref: 00FC63D1
              • inet_ntoa.WSOCK32(?), ref: 00FC63DC
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
              • String ID:
              • API String ID: 1504782959-0
              • Opcode ID: f029359b37250620d8365bc94cc001c1b6aa2444757c1d28269edd33b8316fa4
              • Instruction ID: 87202c9df16d058eba68e08caea3aeeb7d0fd4dc84fc9a26b01759c10069358f
              • Opcode Fuzzy Hash: f029359b37250620d8365bc94cc001c1b6aa2444757c1d28269edd33b8316fa4
              • Instruction Fuzzy Hash: 0A115172900109AFCB04FBA4DD96DAE77B9AF04311B144069FA06E7261DB389E08FB61
              APIs
              • SendMessageW.USER32(?,000000B0,?,?), ref: 00FA8B61
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FA8B73
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FA8B89
              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00FA8BA4
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend
              • String ID:
              • API String ID: 3850602802-0
              • Opcode ID: ae402d7a517a9fcd77d4d8fb9bfa6c9ecad0f3ed5a3d26c7b0a28dc37e202b62
              • Instruction ID: e94d700e7675606f733fd8fede880f9e89d629e0124cbbe1d7b9e1bd089d3816
              • Opcode Fuzzy Hash: ae402d7a517a9fcd77d4d8fb9bfa6c9ecad0f3ed5a3d26c7b0a28dc37e202b62
              • Instruction Fuzzy Hash: 19110AB9901218BFDB11DBA5CC85F9DBB74FB49750F204095E900B7290DA716E11EBA4
              APIs
                • Part of subcall function 00F52612: GetWindowLongW.USER32(?,000000EB), ref: 00F52623
              • DefDlgProcW.USER32(?,00000020,?), ref: 00F512D8
              • GetClientRect.USER32(?,?), ref: 00F8B5FB
              • GetCursorPos.USER32(?), ref: 00F8B605
              • ScreenToClient.USER32(?,?), ref: 00F8B610
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Client$CursorLongProcRectScreenWindow
              • String ID:
              • API String ID: 4127811313-0
              • Opcode ID: d8125aa125e52c5106c34c2683152e8ed29a79f666d1c49bfa3ed073240c30a2
              • Instruction ID: 801b65b2e5c38a24a916b17b010201464a4f96af507e123234869103f24c9d47
              • Opcode Fuzzy Hash: d8125aa125e52c5106c34c2683152e8ed29a79f666d1c49bfa3ed073240c30a2
              • Instruction Fuzzy Hash: 26111935901019BBCB10EFA4D885AAE77B9FB05302F400456EA41E7240C734BA59ABA5
              APIs
              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00FAFCED,?,00FB0D40,?,00008000), ref: 00FB115F
              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00FAFCED,?,00FB0D40,?,00008000), ref: 00FB1184
              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00FAFCED,?,00FB0D40,?,00008000), ref: 00FB118E
              • Sleep.KERNEL32(?,?,?,?,?,?,?,00FAFCED,?,00FB0D40,?,00008000), ref: 00FB11C1
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CounterPerformanceQuerySleep
              • String ID:
              • API String ID: 2875609808-0
              • Opcode ID: 21cb50e5b9be617f39854ef3a777112329bdf4e025266b96214a811458aee7c4
              • Instruction ID: 381aa7055217df36ec406be141ebcd58816e7655ce35110ea2990446300aac65
              • Opcode Fuzzy Hash: 21cb50e5b9be617f39854ef3a777112329bdf4e025266b96214a811458aee7c4
              • Instruction Fuzzy Hash: 4D118E32C0151CE7CF009FAAD858BEEBB7CFF09711F904056EA45B6240CB309554EBA1
              APIs
              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00FAD84D
              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00FAD864
              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00FAD879
              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00FAD897
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Type$Register$FileLoadModuleNameUser
              • String ID:
              • API String ID: 1352324309-0
              • Opcode ID: 88466e8644e560b553c676a78b8414f8b7fa4b57a7ac925d07a03478ad9dc855
              • Instruction ID: bac7f9594732b4fcfa8e5bdd2e0f19f129e0e397e7831fd63da410ba32cbe370
              • Opcode Fuzzy Hash: 88466e8644e560b553c676a78b8414f8b7fa4b57a7ac925d07a03478ad9dc855
              • Instruction Fuzzy Hash: 571161B5606304DBE320CF60DC08F97BBBCEB01B00F10856AA517D6890D7B8E549BBA1
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
              • String ID:
              • API String ID: 3016257755-0
              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
              • Instruction ID: 6eba845941de31e6292df7c0be767af81e75b95794e121aa3ba0753caaed89f9
              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
              • Instruction Fuzzy Hash: 24014B7244824ABBCF167E84CC41DEE3F62BB18361B688415FA1858031D336D9B1BB81
              APIs
              • GetWindowRect.USER32(?,?), ref: 00FDB2E4
              • ScreenToClient.USER32(?,?), ref: 00FDB2FC
              • ScreenToClient.USER32(?,?), ref: 00FDB320
              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00FDB33B
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ClientRectScreen$InvalidateWindow
              • String ID:
              • API String ID: 357397906-0
              • Opcode ID: 1577b0145e69376ecc7865a9b7b755793082979184221a1a62350f85300e6c39
              • Instruction ID: 42f23c41171be6c345a2cc9f3aa6aedd7d5b01c2888e0aaedaa3423cfd213054
              • Opcode Fuzzy Hash: 1577b0145e69376ecc7865a9b7b755793082979184221a1a62350f85300e6c39
              • Instruction Fuzzy Hash: 911143B9D0020DEFDB41CFA9C8849EEBBB9FB08310F108166E915E3620D735AA559F50
              APIs
              • _memset.LIBCMT ref: 00FDB644
              • _memset.LIBCMT ref: 00FDB653
              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,01016F20,01016F64), ref: 00FDB682
              • CloseHandle.KERNEL32 ref: 00FDB694
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _memset$CloseCreateHandleProcess
              • String ID:
              • API String ID: 3277943733-0
              • Opcode ID: 1445510c6bd906937e458ae7981c20db965651614cd260445a8cf626b42ac0d8
              • Instruction ID: e1dbb3e87b05234792fba2b928d657b316bf5b0e8b50bd12a1eb4ddc39ed9abe
              • Opcode Fuzzy Hash: 1445510c6bd906937e458ae7981c20db965651614cd260445a8cf626b42ac0d8
              • Instruction Fuzzy Hash: 27F089B25413047BE2202775AC05F7B3A9DEB04355F404029FA49D5185D7BF8C00D7A9
              APIs
              • EnterCriticalSection.KERNEL32(?), ref: 00FB6BE6
                • Part of subcall function 00FB76C4: _memset.LIBCMT ref: 00FB76F9
              • _memmove.LIBCMT ref: 00FB6C09
              • _memset.LIBCMT ref: 00FB6C16
              • LeaveCriticalSection.KERNEL32(?), ref: 00FB6C26
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CriticalSection_memset$EnterLeave_memmove
              • String ID:
              • API String ID: 48991266-0
              • Opcode ID: 03486466dc57107a266069981652489f12d78220ea2450777713d14d45bd3b58
              • Instruction ID: 792df2b44a1b90ef04fd3355389643c94eefc92e23ed10926643e5d8a4684e8b
              • Opcode Fuzzy Hash: 03486466dc57107a266069981652489f12d78220ea2450777713d14d45bd3b58
              • Instruction Fuzzy Hash: D0F0543A100104ABCF016F55DC85E8ABF2AEF45361F04C061FE095E227CB35E911EBB5
              APIs
              • GetSysColor.USER32(00000008), ref: 00F52231
              • SetTextColor.GDI32(?,000000FF), ref: 00F5223B
              • SetBkMode.GDI32(?,00000001), ref: 00F52250
              • GetStockObject.GDI32(00000005), ref: 00F52258
              • GetWindowDC.USER32(?,00000000), ref: 00F8BE83
              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00F8BE90
              • GetPixel.GDI32(00000000,?,00000000), ref: 00F8BEA9
              • GetPixel.GDI32(00000000,00000000,?), ref: 00F8BEC2
              • GetPixel.GDI32(00000000,?,?), ref: 00F8BEE2
              • ReleaseDC.USER32(?,00000000), ref: 00F8BEED
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
              • String ID:
              • API String ID: 1946975507-0
              • Opcode ID: 6c226df7a2a87baac9c7e7598fde5cf9d6335bf5fd6644711931a3ac4963b4ea
              • Instruction ID: 5329bc067ec41cc38440d31d9020f258c79458d4bf9415c44673da01f1870184
              • Opcode Fuzzy Hash: 6c226df7a2a87baac9c7e7598fde5cf9d6335bf5fd6644711931a3ac4963b4ea
              • Instruction Fuzzy Hash: FEE03032504248AADF215FB4FC0DBD83B11EB05332F048367FA6A880E187714584EB11
              APIs
              • GetCurrentThread.KERNEL32 ref: 00FA871B
              • OpenThreadToken.ADVAPI32(00000000,?,?,?,00FA82E6), ref: 00FA8722
              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00FA82E6), ref: 00FA872F
              • OpenProcessToken.ADVAPI32(00000000,?,?,?,00FA82E6), ref: 00FA8736
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CurrentOpenProcessThreadToken
              • String ID:
              • API String ID: 3974789173-0
              • Opcode ID: 82a6d69d2edd7ac60e121d98edbe613d054373611a2a8024f9ec6374a078aacc
              • Instruction ID: de8e919140f11801ba76fb573ba3b1f14a1eb743bb03f23df1e05099ef8c0a8b
              • Opcode Fuzzy Hash: 82a6d69d2edd7ac60e121d98edbe613d054373611a2a8024f9ec6374a078aacc
              • Instruction Fuzzy Hash: 25E08676A122159BD7206FB05D0CF563BADEF517E2F158829B246CB040DA74884AE750
              APIs
              • OleSetContainedObject.OLE32(?,00000001), ref: 00FAB4BE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ContainedObject
              • String ID: AutoIt3GUI$Container
              • API String ID: 3565006973-3941886329
              • Opcode ID: f31a9a358986626fd34e1c8f3b1524a0a6223f72da30c2d332d39acee5dc406f
              • Instruction ID: c73a1b6fadbb025fd4b9499210d9f40fc84da5b42e98c578dad36c992e3d1f6e
              • Opcode Fuzzy Hash: f31a9a358986626fd34e1c8f3b1524a0a6223f72da30c2d332d39acee5dc406f
              • Instruction Fuzzy Hash: 52915AB1600701AFDB14DF64C884B6ABBE9FF49710F24856EF94ACB292DB71E841DB50
              APIs
                • Part of subcall function 00F6FC86: _wcscpy.LIBCMT ref: 00F6FCA9
                • Part of subcall function 00F59837: __itow.LIBCMT ref: 00F59862
                • Part of subcall function 00F59837: __swprintf.LIBCMT ref: 00F598AC
              • __wcsnicmp.LIBCMT ref: 00FBB02D
              • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00FBB0F6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
              • String ID: LPT
              • API String ID: 3222508074-1350329615
              • Opcode ID: 71579cceddc8a57edc6b27ad889b12b085afd7550a26c5aadc1baae3d14d01ff
              • Instruction ID: b70fc8e07f2917a94b424e351c16edaa188111fe3461542b453338b9e8ec8359
              • Opcode Fuzzy Hash: 71579cceddc8a57edc6b27ad889b12b085afd7550a26c5aadc1baae3d14d01ff
              • Instruction Fuzzy Hash: AC616F76E00215EFCB18EF99CC91EEEB7B4AB08310F144069F916AB251D7B4AE44EF51
              APIs
              • Sleep.KERNEL32(00000000), ref: 00F62968
              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00F62981
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: GlobalMemorySleepStatus
              • String ID: @
              • API String ID: 2783356886-2766056989
              • Opcode ID: 4a3fb66839920edf9ebf17dcfc9bada43178b4f2371f0ab2e8f37f1ee6cb9da3
              • Instruction ID: 4a33feb6bcdae319ee30ca2a42637f57816d01db4ca2952fc69b8d58e8958fd3
              • Opcode Fuzzy Hash: 4a3fb66839920edf9ebf17dcfc9bada43178b4f2371f0ab2e8f37f1ee6cb9da3
              • Instruction Fuzzy Hash: FD5165724087489BD320AF10DC86BAFBBE8FF85341F81885DF6D8410A1DBB4952DDB66
              APIs
                • Part of subcall function 00F54F0B: __fread_nolock.LIBCMT ref: 00F54F29
              • _wcscmp.LIBCMT ref: 00FB9824
              • _wcscmp.LIBCMT ref: 00FB9837
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: _wcscmp$__fread_nolock
              • String ID: FILE
              • API String ID: 4029003684-3121273764
              • Opcode ID: 75904fc3020c2eef899e1458c58ad515559c44ae6e3a8b86947116348480ff2c
              • Instruction ID: 580328fb19a4117399dab1a247adece100a9ac6c7819cd275e4ec06743fba4e1
              • Opcode Fuzzy Hash: 75904fc3020c2eef899e1458c58ad515559c44ae6e3a8b86947116348480ff2c
              • Instruction Fuzzy Hash: 59410B31A04209BADF209FA5CC45FEFBBFDEF85714F00406AFA04E7181D6B5A944AB61
              APIs
              • _memset.LIBCMT ref: 00FC259E
              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00FC25D4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CrackInternet_memset
              • String ID: |
              • API String ID: 1413715105-2343686810
              • Opcode ID: dafe6ab3933f96b176d32f31eeb11abb2adab7b83752952ec443208fd1cc7811
              • Instruction ID: 9b1e52ae2b7465a19dcd61deaf048e5864d2fee3d04ec4e3af1ce209c2ec63df
              • Opcode Fuzzy Hash: dafe6ab3933f96b176d32f31eeb11abb2adab7b83752952ec443208fd1cc7811
              • Instruction Fuzzy Hash: 05311971800219ABCF41EFA5EC85EEEBFB9FF08350F100059FD15A6162DA355A5AEB60
              APIs
              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00FD7B61
              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00FD7B76
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: '
              • API String ID: 3850602802-1997036262
              • Opcode ID: b5a3dbcb9a9979c95fcee318cfd8d61cfa3bfdff6d2a89f4a76f0515db442b5f
              • Instruction ID: a7038e01fc855605679cdc0dcf3bb61e97996d9c60e2960194943f762165a270
              • Opcode Fuzzy Hash: b5a3dbcb9a9979c95fcee318cfd8d61cfa3bfdff6d2a89f4a76f0515db442b5f
              • Instruction Fuzzy Hash: 94413674A0430A9FDB10DF68C881BEABBB6FB49300F14016AE904EF395E734A941DF90
              APIs
              • DestroyWindow.USER32(?,?,?,?), ref: 00FD6B17
              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00FD6B53
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$DestroyMove
              • String ID: static
              • API String ID: 2139405536-2160076837
              • Opcode ID: f697c02949d187ef0a0d6421ccfb055264cdc59770daaa4f34c50703e753eb4e
              • Instruction ID: b3356f318955cfa5c6522ab4c3d0cce9d37af9a8b32442cbd4fe40eed988f971
              • Opcode Fuzzy Hash: f697c02949d187ef0a0d6421ccfb055264cdc59770daaa4f34c50703e753eb4e
              • Instruction Fuzzy Hash: EE318F71500204AEDB109F64CC41BFB77BAFF88764F14861AF9A5D7290DB35AC45E760
              APIs
              • _memset.LIBCMT ref: 00FB2911
              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00FB294C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: InfoItemMenu_memset
              • String ID: 0
              • API String ID: 2223754486-4108050209
              • Opcode ID: 900e1f61446e0d91a6979cbceacda3d5dcb0752ec5dc3686b29b7b20086ead61
              • Instruction ID: e9ec72d9c94ece0f6c63305b9fb7e74214471176f8d61d7ff224459a132eb3b1
              • Opcode Fuzzy Hash: 900e1f61446e0d91a6979cbceacda3d5dcb0752ec5dc3686b29b7b20086ead61
              • Instruction Fuzzy Hash: 9431D531A003059BEB64CF5ADC45BEEBBB8EF46360F144019E989A61A0D7749944FF51
              APIs
              • __snwprintf.LIBCMT ref: 00FC3A66
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: __snwprintf_memmove
              • String ID: , $$AUTOITCALLVARIABLE%d
              • API String ID: 3506404897-2584243854
              • Opcode ID: d4bd6c31c401e951cdb9012c5f659963e373e34ba4cf7e97c4b8ad60aab967a1
              • Instruction ID: 4d865011cf27a1754a0b8a1ec7a52980dce83b97aeb5208878728f370f399b79
              • Opcode Fuzzy Hash: d4bd6c31c401e951cdb9012c5f659963e373e34ba4cf7e97c4b8ad60aab967a1
              • Instruction Fuzzy Hash: 5021C335A00219AFCF14FF64DC82EAE77B5BF44740F008459F945AB182DB38EA55EB61
              APIs
              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00FD6761
              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00FD676C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: Combobox
              • API String ID: 3850602802-2096851135
              • Opcode ID: 364ede31f3a0fac942d1d50084c9ac4c2e5cc1d5fdf23873bac342cdd285f7bc
              • Instruction ID: c32c440f38ec14daa2db0fdb435cf61d9efee9d8411c435437373def8aeb1bce
              • Opcode Fuzzy Hash: 364ede31f3a0fac942d1d50084c9ac4c2e5cc1d5fdf23873bac342cdd285f7bc
              • Instruction Fuzzy Hash: 69119371700208AFEF118F54DC81EAB376BEB48368F14412AF954DB391DA35DC51A7A0
              APIs
                • Part of subcall function 00F51D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00F51D73
                • Part of subcall function 00F51D35: GetStockObject.GDI32(00000011), ref: 00F51D87
                • Part of subcall function 00F51D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00F51D91
              • GetWindowRect.USER32(00000000,?), ref: 00FD6C71
              • GetSysColor.USER32(00000012), ref: 00FD6C8B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Window$ColorCreateMessageObjectRectSendStock
              • String ID: static
              • API String ID: 1983116058-2160076837
              • Opcode ID: 2e6cabd1e6bd4a8c71192b20905977d56f6f751d7085081bd892075797c719f7
              • Instruction ID: ae2b034cf326a92c2edaa224a35c9210718c2dab09c7a8c7d81f131f9d36e970
              • Opcode Fuzzy Hash: 2e6cabd1e6bd4a8c71192b20905977d56f6f751d7085081bd892075797c719f7
              • Instruction Fuzzy Hash: 8B211772A20209AFDB04DFB8DC45EEA7BA9FB08315F04462AF995D2250D635E854AB60
              APIs
              • GetWindowTextLengthW.USER32(00000000), ref: 00FD69A2
              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00FD69B1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: LengthMessageSendTextWindow
              • String ID: edit
              • API String ID: 2978978980-2167791130
              • Opcode ID: 535ca67a2378993bde12a75faac572f903124d81e844f72a6cc92c21eeb20a71
              • Instruction ID: fcb3e0b815157de7928f34e7a2e4bce36c4bc79ffb83cc0ccbb4ff6627aa8c05
              • Opcode Fuzzy Hash: 535ca67a2378993bde12a75faac572f903124d81e844f72a6cc92c21eeb20a71
              • Instruction Fuzzy Hash: 00119A71900208ABEB109E749C60EAB37AAEB053B4F584726F9A1D62E0C736DC54B761
              APIs
              • _memset.LIBCMT ref: 00FB2A22
              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00FB2A41
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: InfoItemMenu_memset
              • String ID: 0
              • API String ID: 2223754486-4108050209
              • Opcode ID: 39856f7607c2ee62740f00265c1ef5667551e0d7d870c9eb04581982d86b0d93
              • Instruction ID: 7d437e064c5a933e16cb9a4a70fcbcdad8c822dad1b7f580509c82ed7fb8a85e
              • Opcode Fuzzy Hash: 39856f7607c2ee62740f00265c1ef5667551e0d7d870c9eb04581982d86b0d93
              • Instruction Fuzzy Hash: 5411B932D01114ABDB71EB59DC44BEA77BCAB86324F144021E855F7250D778AD06EB91
              APIs
              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00FC222C
              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00FC2255
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Internet$OpenOption
              • String ID: <local>
              • API String ID: 942729171-4266983199
              • Opcode ID: 419fd75a9226e4fb49fb6b122486a1f5216e5189ca16916b96dbe8641ae42f8e
              • Instruction ID: 23ff5a05d59bc413a84d5f04224614ccb3f1f7d9367faa2c023672e851acf65c
              • Opcode Fuzzy Hash: 419fd75a9226e4fb49fb6b122486a1f5216e5189ca16916b96dbe8641ae42f8e
              • Instruction Fuzzy Hash: 8311A071941226BAEB658F518D86FFBFBA8FF16761F10822EF91586000D3705994E6F0
              APIs
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
                • Part of subcall function 00FAAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FAAABC
              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00FA8E73
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ClassMessageNameSend_memmove
              • String ID: ComboBox$ListBox
              • API String ID: 372448540-1403004172
              • Opcode ID: 0cb4de3b43087e8fa0ed52953930db59699ba5b24e658bd3c6b621caf717e9bd
              • Instruction ID: e12d87f64fffd6f8ab9d95f890d08449acc6dbf31dea56a5daa98eb49393e19c
              • Opcode Fuzzy Hash: 0cb4de3b43087e8fa0ed52953930db59699ba5b24e658bd3c6b621caf717e9bd
              • Instruction Fuzzy Hash: 9701F5B1A41218EB9B15EBE0CC919FE7769EF02360F000619FC615B2E1DE39580CE650
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: __fread_nolock_memmove
              • String ID: EA06
              • API String ID: 1988441806-3962188686
              • Opcode ID: 704106a15f77d2a84a7209a3f32433301104cca441cfb1eace3eca348166deb3
              • Instruction ID: a7b69bb929fdf28b94331dfaf09465c1d8162a935978aa74ceae69e7336f8ac3
              • Opcode Fuzzy Hash: 704106a15f77d2a84a7209a3f32433301104cca441cfb1eace3eca348166deb3
              • Instruction Fuzzy Hash: 2101F972C042187EDB18CAA9CC16EEE7BFCDB15711F00419FF596D6181E9B9A6049B60
              APIs
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
                • Part of subcall function 00FAAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FAAABC
              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00FA8D6B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ClassMessageNameSend_memmove
              • String ID: ComboBox$ListBox
              • API String ID: 372448540-1403004172
              • Opcode ID: 08e71e72c13440b361db9c77bfd872a3e1414fb3b0e1fd70e17301b14e5915e8
              • Instruction ID: e2c360bc6d1646ab2ec4fb81fe86c3c47dce28208191de8387c3dc065ffb22ee
              • Opcode Fuzzy Hash: 08e71e72c13440b361db9c77bfd872a3e1414fb3b0e1fd70e17301b14e5915e8
              • Instruction Fuzzy Hash: 8A01DFB1A41108ABDB15EBA0CD52EFE77B8DF16350F100029B9426B2E1DE699E0CE271
              APIs
                • Part of subcall function 00F57DE1: _memmove.LIBCMT ref: 00F57E22
                • Part of subcall function 00FAAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00FAAABC
              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00FA8DEE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ClassMessageNameSend_memmove
              • String ID: ComboBox$ListBox
              • API String ID: 372448540-1403004172
              • Opcode ID: 3ddb98f3842cdd046a19678d006b6e2ef4d5faf836add79680a631d3f17f0a9b
              • Instruction ID: b3f8f4309edc7eb82ff8def912a8065669e2a22295e87c863f6c61fbd9144b0b
              • Opcode Fuzzy Hash: 3ddb98f3842cdd046a19678d006b6e2ef4d5faf836add79680a631d3f17f0a9b
              • Instruction Fuzzy Hash: 1601F2F1A41108A7DB11EBA4CD52EFE77A88F12350F104019BC42A72D2DE299E0DF271
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: ClassName_wcscmp
              • String ID: #32770
              • API String ID: 2292705959-463685578
              • Opcode ID: 1a9221cbd6d09dda53f11cd44a393c80387e8963ac4dfa15b32d95003c72883f
              • Instruction ID: 8c7e2ee22d6045393442c6691857451e729272dc55a06440ab4e5044b9a8d959
              • Opcode Fuzzy Hash: 1a9221cbd6d09dda53f11cd44a393c80387e8963ac4dfa15b32d95003c72883f
              • Instruction Fuzzy Hash: 3AE0D13290032D27D72096959C45FE7F7ACEB45B71F010057FD44D7041D5759A45C7D1
              APIs
                • Part of subcall function 00F8B314: _memset.LIBCMT ref: 00F8B321
                • Part of subcall function 00F70940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00F8B2F0,?,?,?,00F5100A), ref: 00F70945
              • IsDebuggerPresent.KERNEL32(?,?,?,00F5100A), ref: 00F8B2F4
              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00F5100A), ref: 00F8B303
              Strings
              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00F8B2FE
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
              • API String ID: 3158253471-631824599
              • Opcode ID: 9dae67525b1e9d85de79e0d15ee7644bc0ea8ff459e119876c5b1a3f4b1f6f15
              • Instruction ID: f91d934a9338502ae8de010fd286d6450cd69e1ad93b3f9259630831506c300b
              • Opcode Fuzzy Hash: 9dae67525b1e9d85de79e0d15ee7644bc0ea8ff459e119876c5b1a3f4b1f6f15
              • Instruction Fuzzy Hash: 58E06D706003058BD760AF28D8047827BE4AF00314F00892DF986C7291EBB8D408EBA1
              APIs
              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00FA7C82
                • Part of subcall function 00F73358: _doexit.LIBCMT ref: 00F73362
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Message_doexit
              • String ID: AutoIt$Error allocating memory.
              • API String ID: 1993061046-4017498283
              • Opcode ID: 966c5278377fc9b5b0fb08157640eeacb6dcecec4d4f95c252aabe1417c26174
              • Instruction ID: b6f98daedb02048e2cd29e9daee90eb1c850b2ff1fc0e7dd8ee08f7cc64597c5
              • Opcode Fuzzy Hash: 966c5278377fc9b5b0fb08157640eeacb6dcecec4d4f95c252aabe1417c26174
              • Instruction Fuzzy Hash: C1D0C23238435832D11132BA6C06FCA36484F01B62F104016FB08994D349D9958071A6
              APIs
              • GetSystemDirectoryW.KERNEL32(?), ref: 00F91775
                • Part of subcall function 00FCBFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,00F9195E,?), ref: 00FCBFFE
                • Part of subcall function 00FCBFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00FCC010
              • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00F9196D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: Library$AddressDirectoryFreeLoadProcSystem
              • String ID: WIN_XPe
              • API String ID: 582185067-3257408948
              • Opcode ID: d537af5642982c35a77a539744716b47eea0a15abdad167851fb3f2df6c6bdb4
              • Instruction ID: 7aeba0c67285f6233f5cd9a31db6033a4d90190eb2f6c919a0385b9f24f382cf
              • Opcode Fuzzy Hash: d537af5642982c35a77a539744716b47eea0a15abdad167851fb3f2df6c6bdb4
              • Instruction Fuzzy Hash: 55F0C97180110ADFEF15DBA1C995BECBBF8BB08305F5400AAE512A2190D7754F88EF61
              APIs
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FD59AE
              • PostMessageW.USER32(00000000), ref: 00FD59B5
                • Part of subcall function 00FB5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FB52BC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: FindMessagePostSleepWindow
              • String ID: Shell_TrayWnd
              • API String ID: 529655941-2988720461
              • Opcode ID: c0ca145815b2c7c76ce2599bb0afec8ca382c8072ae8f2e74e7b52258e897991
              • Instruction ID: 628ad3659940782847a7ee1b35dcd6377c5f2ec58fb5484436effbc197e2be8c
              • Opcode Fuzzy Hash: c0ca145815b2c7c76ce2599bb0afec8ca382c8072ae8f2e74e7b52258e897991
              • Instruction Fuzzy Hash: 13D0C9317823157AEA64BB71AC0FFD67615BB04B51F08082AB346AA1D0C9E5A804DA58
              APIs
              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00FD596E
              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00FD5981
                • Part of subcall function 00FB5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00FB52BC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1344071474.0000000000F51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F50000, based on PE: true
              • Associated: 00000000.00000002.1344053924.0000000000F50000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000000FDF000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344123173.0000000001004000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344188669.000000000100E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1344209438.0000000001017000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_f50000_ZV2G9QQzlR.jbxd
              Similarity
              • API ID: FindMessagePostSleepWindow
              • String ID: Shell_TrayWnd
              • API String ID: 529655941-2988720461
              • Opcode ID: fe52f77a88a7851e515b0573da58d5ee48607de77fe0297c8cac4179db493d7e
              • Instruction ID: d8b7afb42b6dc78ce138b4eaeb721f4cef4ae768e4e480d17e3919b8375a4a17
              • Opcode Fuzzy Hash: fe52f77a88a7851e515b0573da58d5ee48607de77fe0297c8cac4179db493d7e
              • Instruction Fuzzy Hash: E6D0C935785315B6EA64BB71AC1FFD67A15BB00B51F08082AB34AAA1D0C9E59804DA54