Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
I3LPkQh2an.exe

Overview

General Information

Sample name:I3LPkQh2an.exe
renamed because original name is a hash value
Original sample name:f9d78174d15fee469beb09ad3a07fb4a87333cd00477b8dc934568edcb959738.exe
Analysis ID:1588101
MD5:b277e18dd8f1c8cc1908e58b16db405c
SHA1:b64ecf7d0cf0433d9c919acbf320b421de1a5cf3
SHA256:f9d78174d15fee469beb09ad3a07fb4a87333cd00477b8dc934568edcb959738
Tags:exeWormm0yvuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to behave differently if execute on a Russian/Kazak computer
Creates files in the system32 config directory
Drops executable to a common third party application directory
Found direct / indirect Syscall (likely to bypass EDR)
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Enables driver privileges
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Uncommon Svchost Parent Process
Spawns drivers
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • I3LPkQh2an.exe (PID: 7632 cmdline: "C:\Users\user\Desktop\I3LPkQh2an.exe" MD5: B277E18DD8F1C8CC1908E58B16DB405C)
    • svchost.exe (PID: 7868 cmdline: "C:\Users\user\Desktop\I3LPkQh2an.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • armsvc.exe (PID: 7700 cmdline: "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe" MD5: FD31927032749FC47370737BE446DF49)
  • alg.exe (PID: 7720 cmdline: C:\Windows\System32\alg.exe MD5: 09DAC14A3F12ABA6BB239CCFA7799AD0)
  • AppVStrm.sys (PID: 4 cmdline: MD5: BDA55F89B69757320BC125FF1CB53B26)
  • AppvVemgr.sys (PID: 4 cmdline: MD5: E70EE9B57F8D771E2F4D6E6B535F6757)
  • AppvVfs.sys (PID: 4 cmdline: MD5: 2CBABD729D5E746B6BD8DC1B4B4DB1E1)
  • AppVClient.exe (PID: 7796 cmdline: C:\Windows\system32\AppVClient.exe MD5: 0FBD336D4561FB58CC24C965F9B57A79)
  • elevation_service.exe (PID: 7896 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe" MD5: A19ADA9B1BCFFDFE7612B776B7EB43DA)
  • maintenanceservice.exe (PID: 7940 cmdline: "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe" MD5: 299377D30369966F4E6BFFFE968F16D3)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.1738864587.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000009.00000002.1740236285.0000000003690000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      SourceRuleDescriptionAuthorStrings
      9.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        9.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

          System Summary

          barindex
          Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: , CommandLine: , CommandLine|base64offset|contains: , Image: C:\Windows\System32\drivers\AppVStrm.sys, NewProcessName: C:\Windows\System32\drivers\AppVStrm.sys, OriginalFileName: C:\Windows\System32\drivers\AppVStrm.sys, ParentCommandLine: , ParentImage: , ParentProcessId: -1, ProcessCommandLine: , ProcessId: 4, ProcessName: AppVStrm.sys
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\I3LPkQh2an.exe", CommandLine: "C:\Users\user\Desktop\I3LPkQh2an.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\I3LPkQh2an.exe", ParentImage: C:\Users\user\Desktop\I3LPkQh2an.exe, ParentProcessId: 7632, ParentProcessName: I3LPkQh2an.exe, ProcessCommandLine: "C:\Users\user\Desktop\I3LPkQh2an.exe", ProcessId: 7868, ProcessName: svchost.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\I3LPkQh2an.exe", CommandLine: "C:\Users\user\Desktop\I3LPkQh2an.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\I3LPkQh2an.exe", ParentImage: C:\Users\user\Desktop\I3LPkQh2an.exe, ParentProcessId: 7632, ParentProcessName: I3LPkQh2an.exe, ProcessCommandLine: "C:\Users\user\Desktop\I3LPkQh2an.exe", ProcessId: 7868, ProcessName: svchost.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-10T21:24:25.594354+010020516491A Network Trojan was detected192.168.2.7652511.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-10T21:24:23.316285+010020516481A Network Trojan was detected192.168.2.7609581.1.1.153UDP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-10T21:24:19.811403+010020181411A Network Trojan was detected54.244.188.17780192.168.2.749751TCP
          2025-01-10T21:24:23.207715+010020181411A Network Trojan was detected44.221.84.10580192.168.2.749775TCP
          2025-01-10T21:24:27.040825+010020181411A Network Trojan was detected18.141.10.10780192.168.2.749795TCP
          2025-01-10T21:25:00.871608+010020181411A Network Trojan was detected47.129.31.21280192.168.2.749990TCP
          2025-01-10T21:25:08.131113+010020181411A Network Trojan was detected34.246.200.16080192.168.2.749996TCP
          2025-01-10T21:25:11.418124+010020181411A Network Trojan was detected13.251.16.15080192.168.2.749999TCP
          2025-01-10T21:25:14.219487+010020181411A Network Trojan was detected35.164.78.20080192.168.2.750003TCP
          2025-01-10T21:25:14.750567+010020181411A Network Trojan was detected3.94.10.3480192.168.2.750004TCP
          2025-01-10T21:25:29.432881+010020181411A Network Trojan was detected18.246.231.12080192.168.2.750016TCP
          2025-01-10T21:25:30.041296+010020181411A Network Trojan was detected34.227.7.13880192.168.2.750017TCP
          2025-01-10T21:26:03.847123+010020181411A Network Trojan was detected3.254.94.18580192.168.2.750029TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-10T21:24:19.811403+010020377711A Network Trojan was detected54.244.188.17780192.168.2.749751TCP
          2025-01-10T21:24:23.207715+010020377711A Network Trojan was detected44.221.84.10580192.168.2.749775TCP
          2025-01-10T21:24:27.040825+010020377711A Network Trojan was detected18.141.10.10780192.168.2.749795TCP
          2025-01-10T21:25:00.871608+010020377711A Network Trojan was detected47.129.31.21280192.168.2.749990TCP
          2025-01-10T21:25:08.131113+010020377711A Network Trojan was detected34.246.200.16080192.168.2.749996TCP
          2025-01-10T21:25:11.418124+010020377711A Network Trojan was detected13.251.16.15080192.168.2.749999TCP
          2025-01-10T21:25:14.219487+010020377711A Network Trojan was detected35.164.78.20080192.168.2.750003TCP
          2025-01-10T21:25:14.750567+010020377711A Network Trojan was detected3.94.10.3480192.168.2.750004TCP
          2025-01-10T21:25:29.432881+010020377711A Network Trojan was detected18.246.231.12080192.168.2.750016TCP
          2025-01-10T21:25:30.041296+010020377711A Network Trojan was detected34.227.7.13880192.168.2.750017TCP
          2025-01-10T21:26:03.847123+010020377711A Network Trojan was detected3.254.94.18580192.168.2.750029TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-10T21:24:19.651050+010028508511Malware Command and Control Activity Detected192.168.2.74975054.244.188.17780TCP
          2025-01-10T21:25:24.640330+010028508511Malware Command and Control Activity Detected192.168.2.75001118.141.10.10780TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: I3LPkQh2an.exeAvira: detected
          Source: http://54.244.188.177/wAvira URL Cloud: Label: malware
          Source: http://54.244.188.177/HAvira URL Cloud: Label: malware
          Source: http://54.244.188.177/wbjqiahuptwvbQ(Avira URL Cloud: Label: malware
          Source: http://54.244.188.177/w)Avira URL Cloud: Label: malware
          Source: http://54.244.188.177:80/wbjqiahuptwvbAvira URL Cloud: Label: malware
          Source: http://54.244.188.177/OAvira URL Cloud: Label: malware
          Source: http://54.244.188.177/zAvira URL Cloud: Label: malware
          Source: http://54.244.188.177/qAvira URL Cloud: Label: malware
          Source: http://54.244.188.177/Avira URL Cloud: Label: malware
          Source: http://54.244.188.177/wbjqiahuptwvbAvira URL Cloud: Label: malware
          Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeAvira: detection malicious, Label: W32/Infector.Gen
          Source: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeAvira: detection malicious, Label: W32/Infector.Gen
          Source: C:\Windows\System32\AppVClient.exeAvira: detection malicious, Label: W32/Infector.Gen
          Source: C:\Windows\System32\FXSSVC.exeAvira: detection malicious, Label: W32/Infector.Gen
          Source: C:\Windows\System32\alg.exeAvira: detection malicious, Label: W32/Infector.Gen
          Source: I3LPkQh2an.exeReversingLabs: Detection: 86%
          Source: I3LPkQh2an.exeVirustotal: Detection: 75%Perma Link
          Source: Yara matchFile source: 9.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.1738864587.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.1740236285.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJoe Sandbox ML: detected
          Source: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeJoe Sandbox ML: detected
          Source: C:\Windows\System32\AppVClient.exeJoe Sandbox ML: detected
          Source: C:\Windows\System32\FXSSVC.exeJoe Sandbox ML: detected
          Source: C:\Windows\System32\alg.exeJoe Sandbox ML: detected
          Source: I3LPkQh2an.exeJoe Sandbox ML: detected
          Source: I3LPkQh2an.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Win32\Release\armsvc.pdb source: I3LPkQh2an.exe, 00000000.00000003.1361170036.0000000003EC0000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe.0.dr
          Source: Binary string: DiagnosticsHub.StandardCollector.Service.pdb source: I3LPkQh2an.exe, 00000000.00000003.1387635055.00000000041A0000.00000004.00001000.00020000.00000000.sdmp, DiagnosticsHub.StandardCollector.Service.exe.0.dr
          Source: Binary string: AppVClient.pdbGCTL source: AppVClient.exe.0.dr
          Source: Binary string: ALG.pdbGCTL source: I3LPkQh2an.exe, 00000000.00000003.1365282595.0000000003EC0000.00000004.00001000.00020000.00000000.sdmp, alg.exe.0.dr
          Source: Binary string: AppVClient.pdb source: AppVClient.exe.0.dr
          Source: Binary string: DiagnosticsHub.StandardCollector.Service.pdbGCTL source: I3LPkQh2an.exe, 00000000.00000003.1387635055.00000000041A0000.00000004.00001000.00020000.00000000.sdmp, DiagnosticsHub.StandardCollector.Service.exe.0.dr
          Source: Binary string: FXSSVC.pdbGCTL source: I3LPkQh2an.exe, 00000000.00000003.1397863214.0000000004190000.00000004.00001000.00020000.00000000.sdmp, FXSSVC.exe.0.dr
          Source: Binary string: wntdll.pdbUGP source: I3LPkQh2an.exe, 00000000.00000003.1397960663.00000000050B0000.00000004.00001000.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000003.1398411296.0000000004F10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1699509643.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1697301207.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1740366789.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1740366789.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: I3LPkQh2an.exe, 00000000.00000003.1397960663.00000000050B0000.00000004.00001000.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000003.1398411296.0000000004F10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000009.00000003.1699509643.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1697301207.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1740366789.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1740366789.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: FXSSVC.pdb source: I3LPkQh2an.exe, 00000000.00000003.1397863214.0000000004190000.00000004.00001000.00020000.00000000.sdmp, FXSSVC.exe.0.dr
          Source: Binary string: ALG.pdb source: I3LPkQh2an.exe, 00000000.00000003.1365282595.0000000003EC0000.00000004.00001000.00020000.00000000.sdmp, alg.exe.0.dr

          Spreading

          barindex
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSystem file written: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSystem file written: C:\Windows\System32\AppVClient.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSystem file written: C:\Windows\System32\FXSSVC.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSystem file written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSystem file written: C:\Windows\System32\alg.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0046445A
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046C6D1 FindFirstFileW,FindClose,0_2_0046C6D1
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0046C75C
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046EF95
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046F0F2
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046F3F3
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004637EF
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00463B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00463B12
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046BCBC

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2051648 - Severity 1 - ET MALWARE DNS Query to Expiro Related Domain (przvgke .biz) : 192.168.2.7:60958 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2850851 - Severity 1 - ETPRO MALWARE Win32/Expiro.NDO CnC Activity : 192.168.2.7:49750 -> 54.244.188.177:80
          Source: Network trafficSuricata IDS: 2051649 - Severity 1 - ET MALWARE DNS Query to Expiro Related Domain (knjghuig .biz) : 192.168.2.7:65251 -> 1.1.1.1:53
          Source: Network trafficSuricata IDS: 2850851 - Severity 1 - ETPRO MALWARE Win32/Expiro.NDO CnC Activity : 192.168.2.7:50011 -> 18.141.10.107:80
          Source: Joe Sandbox ViewIP Address: 54.244.188.177 54.244.188.177
          Source: Joe Sandbox ViewIP Address: 18.141.10.107 18.141.10.107
          Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 54.244.188.177:80 -> 192.168.2.7:49751
          Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 54.244.188.177:80 -> 192.168.2.7:49751
          Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 44.221.84.105:80 -> 192.168.2.7:49775
          Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 44.221.84.105:80 -> 192.168.2.7:49775
          Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 18.141.10.107:80 -> 192.168.2.7:49795
          Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 18.141.10.107:80 -> 192.168.2.7:49795
          Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 13.251.16.150:80 -> 192.168.2.7:49999
          Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 13.251.16.150:80 -> 192.168.2.7:49999
          Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 35.164.78.200:80 -> 192.168.2.7:50003
          Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 35.164.78.200:80 -> 192.168.2.7:50003
          Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 34.246.200.160:80 -> 192.168.2.7:49996
          Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 34.246.200.160:80 -> 192.168.2.7:49996
          Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 47.129.31.212:80 -> 192.168.2.7:49990
          Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 47.129.31.212:80 -> 192.168.2.7:49990
          Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 3.94.10.34:80 -> 192.168.2.7:50004
          Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 3.94.10.34:80 -> 192.168.2.7:50004
          Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 18.246.231.120:80 -> 192.168.2.7:50016
          Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 3.254.94.185:80 -> 192.168.2.7:50029
          Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 3.254.94.185:80 -> 192.168.2.7:50029
          Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 34.227.7.138:80 -> 192.168.2.7:50017
          Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 18.246.231.120:80 -> 192.168.2.7:50016
          Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 34.227.7.138:80 -> 192.168.2.7:50017
          Source: global trafficHTTP traffic detected: POST /w HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: pywolwnvd.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 810
          Source: global trafficHTTP traffic detected: POST /cle HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: ssbzmoy.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 810
          Source: global trafficHTTP traffic detected: POST /wbjqiahuptwvb HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: cvgrf.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 810
          Source: global trafficHTTP traffic detected: POST /osbo HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: pywolwnvd.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 874
          Source: global trafficHTTP traffic detected: POST /mxe HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: ssbzmoy.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 874
          Source: global trafficHTTP traffic detected: POST /pajihutcfilntm HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: cvgrf.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 874
          Source: global trafficHTTP traffic detected: POST /voucowxceex HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: knjghuig.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 874
          Source: global trafficHTTP traffic detected: POST /ycqjghy HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: vcddkls.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 874
          Source: global trafficHTTP traffic detected: POST /wfnlorhejqfnr HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: dwrqljrr.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 874
          Source: global trafficHTTP traffic detected: POST /agqwjlv HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: oshhkdluh.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 874
          Source: global trafficHTTP traffic detected: POST /ibckscxhsodddaet HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: lrxdmhrr.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 874
          Source: global trafficHTTP traffic detected: POST /rwlfutjcp HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: lrxdmhrr.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 874
          Source: global trafficHTTP traffic detected: POST /shvehx HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: wllvnzb.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 874
          Source: global trafficHTTP traffic detected: POST /tfd HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: acwjcqqv.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 874
          Source: global trafficHTTP traffic detected: POST /hch HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: acwjcqqv.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 874
          Source: global trafficHTTP traffic detected: POST /gloumaahxxajxf HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: warkcdu.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 874
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004722EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_004722EE
          Source: global trafficDNS traffic detected: DNS query: time.windows.com
          Source: global trafficDNS traffic detected: DNS query: pywolwnvd.biz
          Source: global trafficDNS traffic detected: DNS query: ssbzmoy.biz
          Source: global trafficDNS traffic detected: DNS query: cvgrf.biz
          Source: unknownHTTP traffic detected: POST /w HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: pywolwnvd.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 810
          Source: I3LPkQh2an.exe, 00000000.00000002.1408544408.0000000000CAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://18.141.10.107/
          Source: I3LPkQh2an.exe, 00000000.00000002.1409417800.0000000000EB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://18.141.10.107/cle
          Source: I3LPkQh2an.exe, 00000000.00000002.1408544408.0000000000CDC000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000002.1409100605.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000003.1388701624.0000000000CDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://54.244.188.177/
          Source: I3LPkQh2an.exe, 00000000.00000002.1409100605.0000000000E5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://54.244.188.177/H
          Source: I3LPkQh2an.exe, 00000000.00000002.1409100605.0000000000E5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://54.244.188.177/O
          Source: I3LPkQh2an.exe, 00000000.00000002.1409100605.0000000000E5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://54.244.188.177/q
          Source: I3LPkQh2an.exe, 00000000.00000003.1388701624.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000003.1388701624.0000000000CDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://54.244.188.177/w
          Source: I3LPkQh2an.exe, 00000000.00000003.1388701624.0000000000CDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://54.244.188.177/w)
          Source: I3LPkQh2an.exe, 00000000.00000002.1408544408.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000002.1409100605.0000000000D10000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000002.1408544408.0000000000CDC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://54.244.188.177/wbjqiahuptwvb
          Source: I3LPkQh2an.exe, 00000000.00000002.1408544408.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://54.244.188.177/wbjqiahuptwvbQ(
          Source: I3LPkQh2an.exe, 00000000.00000002.1409100605.0000000000E5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://54.244.188.177/z
          Source: I3LPkQh2an.exe, 00000000.00000002.1409100605.0000000000D10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://54.244.188.177:80/wbjqiahuptwvb
          Source: I3LPkQh2an.exe, 00000000.00000002.1408544408.0000000000C18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pywolwnvd.biz/N
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00474164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00474164
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00474164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00474164
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00473F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00473F66
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0046001C
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0048CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0048CABC

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 9.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.1738864587.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.1740236285.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: This is a third-party compiled AutoIt script.0_2_00403B3A
          Source: I3LPkQh2an.exeString found in binary or memory: This is a third-party compiled AutoIt script.
          Source: I3LPkQh2an.exe, 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_0147ddae-b
          Source: I3LPkQh2an.exe, 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_44efd5a4-d
          Source: I3LPkQh2an.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_00cb5d9f-9
          Source: I3LPkQh2an.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_a58e40b6-0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0042CBC3 NtClose,9_2_0042CBC3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972B60 NtClose,LdrInitializeThunk,9_2_03972B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972DF0 NtQuerySystemInformation,LdrInitializeThunk,9_2_03972DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039735C0 NtCreateMutant,LdrInitializeThunk,9_2_039735C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03974340 NtSetContextThread,9_2_03974340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03974650 NtSuspendThread,9_2_03974650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972B80 NtQueryInformationFile,9_2_03972B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972BA0 NtEnumerateValueKey,9_2_03972BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972BF0 NtAllocateVirtualMemory,9_2_03972BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972BE0 NtQueryValueKey,9_2_03972BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972AB0 NtWaitForSingleObject,9_2_03972AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972AD0 NtReadFile,9_2_03972AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972AF0 NtWriteFile,9_2_03972AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972F90 NtProtectVirtualMemory,9_2_03972F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972FB0 NtResumeThread,9_2_03972FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972FA0 NtQuerySection,9_2_03972FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972FE0 NtCreateFile,9_2_03972FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972F30 NtCreateSection,9_2_03972F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972F60 NtCreateProcessEx,9_2_03972F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972E80 NtReadVirtualMemory,9_2_03972E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972EA0 NtAdjustPrivilegesToken,9_2_03972EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972EE0 NtQueueApcThread,9_2_03972EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972E30 NtWriteVirtualMemory,9_2_03972E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972DB0 NtEnumerateKey,9_2_03972DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972DD0 NtDelayExecution,9_2_03972DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972D10 NtMapViewOfSection,9_2_03972D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972D00 NtSetInformationFile,9_2_03972D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972D30 NtUnmapViewOfSection,9_2_03972D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972CA0 NtQueryInformationToken,9_2_03972CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972CC0 NtQueryVirtualMemory,9_2_03972CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972CF0 NtOpenProcess,9_2_03972CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972C00 NtQueryInformationProcess,9_2_03972C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972C70 NtFreeVirtualMemory,9_2_03972C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972C60 NtCreateKey,9_2_03972C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03973090 NtSetValueKey,9_2_03973090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03973010 NtOpenDirectoryObject,9_2_03973010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039739B0 NtGetContextThread,9_2_039739B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03973D10 NtOpenProcessToken,9_2_03973D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03973D70 NtOpenThread,9_2_03973D70
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0046A1EF
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00458310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00458310
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004651BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_004651BD
          Source: C:\Windows\System32\AppVClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Roaming\a8a24eee21ca4edc.binJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0040E6A00_2_0040E6A0
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0042D9750_2_0042D975
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0040FCE00_2_0040FCE0
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004221C50_2_004221C5
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004362D20_2_004362D2
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004803DA0_2_004803DA
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0043242E0_2_0043242E
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004225FA0_2_004225FA
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0045E6160_2_0045E616
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004166E10_2_004166E1
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0043878F0_2_0043878F
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004368440_2_00436844
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004808570_2_00480857
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004188080_2_00418808
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004688890_2_00468889
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0042CB210_2_0042CB21
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00436DB60_2_00436DB6
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00416F9E0_2_00416F9E
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004130300_2_00413030
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0042F1D90_2_0042F1D9
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004231870_2_00423187
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004012870_2_00401287
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004214840_2_00421484
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004155200_2_00415520
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004276960_2_00427696
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004157600_2_00415760
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004219780_2_00421978
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00439AB50_2_00439AB5
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00527CC80_2_00527CC8
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00487DDB0_2_00487DDB
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00421D900_2_00421D90
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0042BDA60_2_0042BDA6
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0040DF000_2_0040DF00
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00413FE00_2_00413FE0
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00B100D90_2_00B100D9
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AD6EAF0_2_00AD6EAF
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AD51EE0_2_00AD51EE
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00B0D5800_2_00B0D580
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00B037800_2_00B03780
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00B0C7F00_2_00B0C7F0
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00B139A30_2_00B139A3
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00B059800_2_00B05980
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AD7B710_2_00AD7B71
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AD7F800_2_00AD7F80
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00E88DF00_2_00E88DF0
          Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_0057A8107_2_0057A810
          Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_00557C007_2_00557C00
          Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_00582D407_2_00582D40
          Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_005579F07_2_005579F0
          Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_0057EEB07_2_0057EEB0
          Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_005792A07_2_005792A0
          Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_005793B07_2_005793B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0040E8559_2_0040E855
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004010C89_2_004010C8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004010D09_2_004010D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0042F1D39_2_0042F1D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004029F89_2_004029F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00402A009_2_00402A00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004032D09_2_004032D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0041040A9_2_0041040A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004104139_2_00410413
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004015009_2_00401500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00416DA39_2_00416DA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0040E6439_2_0040E643
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004106339_2_00410633
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_004026F09_2_004026F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0040E7889_2_0040E788
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0040E7939_2_0040E793
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A003E69_2_03A003E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394E3F09_2_0394E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FA3529_2_039FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C02C09_2_039C02C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E02749_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A001AA9_2_03A001AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F41A29_2_039F41A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F81CC9_2_039F81CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DA1189_2_039DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039301009_2_03930100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C81589_2_039C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D20009_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393C7C09_2_0393C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039647509_2_03964750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039407709_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395C6E09_2_0395C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A005919_2_03A00591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039405359_2_03940535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039EE4F69_2_039EE4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E44209_2_039E4420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F24469_2_039F2446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F6BD79_2_039F6BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FAB409_2_039FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393EA809_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A0A9A69_2_03A0A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039429A09_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039569629_2_03956962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039268B89_2_039268B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396E8F09_2_0396E8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394A8409_2_0394A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039428409_2_03942840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039BEFA09_2_039BEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03932FC89_2_03932FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394CFE09_2_0394CFE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03960F309_2_03960F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E2F309_2_039E2F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03982F289_2_03982F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B4F409_2_039B4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03952E909_2_03952E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FCE939_2_039FCE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FEEDB9_2_039FEEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393AE0D9_2_0393AE0D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FEE269_2_039FEE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940E599_2_03940E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03958DBF9_2_03958DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DCD1F9_2_039DCD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394AD009_2_0394AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E0CB59_2_039E0CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03930CF29_2_03930CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940C009_2_03940C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0398739A9_2_0398739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F132D9_2_039F132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392D34C9_2_0392D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039452A09_2_039452A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395B2C09_2_0395B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E12ED9_2_039E12ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394B1B09_2_0394B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A0B16B9_2_03A0B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392F1729_2_0392F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0397516C9_2_0397516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039EF0CC9_2_039EF0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039470C09_2_039470C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F70E99_2_039F70E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FF0E09_2_039FF0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FF7B09_2_039FF7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F16CC9_2_039F16CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039856309_2_03985630
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DD5B09_2_039DD5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A095C39_2_03A095C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F75719_2_039F7571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FF43F9_2_039FF43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039314609_2_03931460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395FB809_2_0395FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B5BF09_2_039B5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0397DBF99_2_0397DBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FFB769_2_039FFB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DDAAC9_2_039DDAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03985AA09_2_03985AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E1AA39_2_039E1AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039EDAC69_2_039EDAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FFA499_2_039FFA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F7A469_2_039F7A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B3A6C9_2_039B3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D59109_2_039D5910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039499509_2_03949950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395B9509_2_0395B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039438E09_2_039438E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AD8009_2_039AD800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03941F929_2_03941F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FFFB19_2_039FFFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03903FD29_2_03903FD2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03903FD59_2_03903FD5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FFF099_2_039FFF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03949EB09_2_03949EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395FDC09_2_0395FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F1D5A9_2_039F1D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03943D409_2_03943D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F7D739_2_039F7D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FFCF29_2_039FFCF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B9C329_2_039B9C32
          Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeProcess token adjusted: Load DriverJump to behavior
          Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeProcess token adjusted: SecurityJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0392B970 appears 277 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03975130 appears 58 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 039AEA12 appears 86 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 039BF290 appears 105 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03987E54 appears 111 times
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: String function: 00407DE1 appears 35 times
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: String function: 00428900 appears 41 times
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: String function: 00420AE3 appears 70 times
          Source: I3LPkQh2an.exe, 00000000.00000003.1397960663.00000000051DD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs I3LPkQh2an.exe
          Source: I3LPkQh2an.exe, 00000000.00000003.1397009776.0000000005033000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs I3LPkQh2an.exe
          Source: I3LPkQh2an.exe, 00000000.00000003.1387878258.00000000041A0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDiagnosticsHub.StandardCollector.Service.exeD vs I3LPkQh2an.exe
          Source: I3LPkQh2an.exe, 00000000.00000003.1401373706.0000000004190000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFXSSVC.EXEj% vs I3LPkQh2an.exe
          Source: I3LPkQh2an.exe, 00000000.00000003.1365372997.0000000003EC0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameALG.exej% vs I3LPkQh2an.exe
          Source: I3LPkQh2an.exe, 00000000.00000003.1361222935.0000000003EC0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamearmsvc.exeN vs I3LPkQh2an.exe
          Source: unknownDriver loaded: C:\Windows\System32\drivers\AppVStrm.sys
          Source: I3LPkQh2an.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: I3LPkQh2an.exeStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          Source: armsvc.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          Source: alg.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          Source: AppVClient.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          Source: DiagnosticsHub.StandardCollector.Service.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          Source: FXSSVC.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          Source: I3LPkQh2an.exeStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          Source: armsvc.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          Source: alg.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          Source: AppVClient.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          Source: DiagnosticsHub.StandardCollector.Service.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          Source: FXSSVC.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          Source: classification engineClassification label: mal100.spre.troj.expl.evad.winEXE@8/10@7/2
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046A06A GetLastError,FormatMessageW,0_2_0046A06A
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004581CB AdjustTokenPrivileges,CloseHandle,0_2_004581CB
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004587E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_004587E1
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0046B333
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0047EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0047EE0D
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046C397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0046C397
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00404E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00404E89
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AFCBD0 StrStrIW,CloseHandle,StrStrIW,CloseServiceHandle,OpenServiceW,StrStrIW,_wcslen,ChangeServiceConfigW,StrStrIW,StrStrIW,CloseServiceHandle,CloseHandle,StartServiceW,0_2_00AFCBD0
          Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeFile created: C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.logJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile created: C:\Users\user\AppData\Roaming\a8a24eee21ca4edc.binJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Multiarch.m0yv-a8a24eee21ca4edc9e7986a9-b
          Source: C:\Windows\System32\AppVClient.exeMutant created: \BaseNamedObjects\Global\Multiarch.m0yv-a8a24eee21ca4edc9ea72c54-b
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Multiarch.m0yv-a8a24eee21ca4edc-inf
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile created: C:\Users\user~1\AppData\Local\Temp\autB916.tmpJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: I3LPkQh2an.exeReversingLabs: Detection: 86%
          Source: I3LPkQh2an.exeVirustotal: Detection: 75%
          Source: unknownProcess created: C:\Users\user\Desktop\I3LPkQh2an.exe "C:\Users\user\Desktop\I3LPkQh2an.exe"
          Source: unknownProcess created: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe"
          Source: unknownProcess created: C:\Windows\System32\alg.exe C:\Windows\System32\alg.exe
          Source: unknownProcess created: C:\Windows\System32\AppVClient.exe C:\Windows\system32\AppVClient.exe
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\I3LPkQh2an.exe"
          Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe"
          Source: unknownProcess created: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\I3LPkQh2an.exe"Jump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: webio.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\alg.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\alg.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\System32\alg.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: appvpolicy.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: wtsapi32.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: logoncli.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeSection loaded: appmanagementconfiguration.dllJump to behavior
          Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: dbghelp.dllJump to behavior
          Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: version.dllJump to behavior
          Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\AppVClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{52BC3999-6E52-4E8A-87C4-0A2A0CC359B1}\InProcServer32Jump to behavior
          Source: I3LPkQh2an.exeStatic file information: File size 1793024 > 1048576
          Source: I3LPkQh2an.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Win32\Release\armsvc.pdb source: I3LPkQh2an.exe, 00000000.00000003.1361170036.0000000003EC0000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe.0.dr
          Source: Binary string: DiagnosticsHub.StandardCollector.Service.pdb source: I3LPkQh2an.exe, 00000000.00000003.1387635055.00000000041A0000.00000004.00001000.00020000.00000000.sdmp, DiagnosticsHub.StandardCollector.Service.exe.0.dr
          Source: Binary string: AppVClient.pdbGCTL source: AppVClient.exe.0.dr
          Source: Binary string: ALG.pdbGCTL source: I3LPkQh2an.exe, 00000000.00000003.1365282595.0000000003EC0000.00000004.00001000.00020000.00000000.sdmp, alg.exe.0.dr
          Source: Binary string: AppVClient.pdb source: AppVClient.exe.0.dr
          Source: Binary string: DiagnosticsHub.StandardCollector.Service.pdbGCTL source: I3LPkQh2an.exe, 00000000.00000003.1387635055.00000000041A0000.00000004.00001000.00020000.00000000.sdmp, DiagnosticsHub.StandardCollector.Service.exe.0.dr
          Source: Binary string: FXSSVC.pdbGCTL source: I3LPkQh2an.exe, 00000000.00000003.1397863214.0000000004190000.00000004.00001000.00020000.00000000.sdmp, FXSSVC.exe.0.dr
          Source: Binary string: wntdll.pdbUGP source: I3LPkQh2an.exe, 00000000.00000003.1397960663.00000000050B0000.00000004.00001000.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000003.1398411296.0000000004F10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1699509643.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1697301207.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1740366789.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1740366789.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: I3LPkQh2an.exe, 00000000.00000003.1397960663.00000000050B0000.00000004.00001000.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000003.1398411296.0000000004F10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000009.00000003.1699509643.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1697301207.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1740366789.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.1740366789.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: FXSSVC.pdb source: I3LPkQh2an.exe, 00000000.00000003.1397863214.0000000004190000.00000004.00001000.00020000.00000000.sdmp, FXSSVC.exe.0.dr
          Source: Binary string: ALG.pdb source: I3LPkQh2an.exe, 00000000.00000003.1365282595.0000000003EC0000.00000004.00001000.00020000.00000000.sdmp, alg.exe.0.dr
          Source: alg.exe.0.drStatic PE information: 0xF67E8745 [Tue Jan 18 10:28:21 2101 UTC]
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00404B37 LoadLibraryA,GetProcAddress,0_2_00404B37
          Source: FXSSVC.exe.0.drStatic PE information: real checksum: 0xa20cd should be: 0x13ee11
          Source: armsvc.exe.0.drStatic PE information: section name: .didat
          Source: alg.exe.0.drStatic PE information: section name: .didat
          Source: FXSSVC.exe.0.drStatic PE information: section name: .didat
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00428945 push ecx; ret 0_2_00428958
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00402F12 push es; retf 0_2_00402F13
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00ADB180 push 00ADB0CAh; ret 0_2_00ADB061
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00ADB180 push 00ADB30Dh; ret 0_2_00ADB1E6
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00ADB180 push 00ADB2F2h; ret 0_2_00ADB262
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00ADB180 push 00ADB255h; ret 0_2_00ADB2ED
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00ADB180 push 00ADB2D0h; ret 0_2_00ADB346
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00ADB180 push 00ADB37Fh; ret 0_2_00ADB3B7
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AD520C push 00AD528Fh; ret 0_2_00AD522D
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF852Eh; ret 0_2_00AF7F3A
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF8514h; ret 0_2_00AF7F66
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF7E66h; ret 0_2_00AF8057
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF817Ah; ret 0_2_00AF808B
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF82E5h; ret 0_2_00AF80D9
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF826Ah; ret 0_2_00AF819E
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF849Ch; ret 0_2_00AF81E4
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF805Ch; ret 0_2_00AF8255
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF8321h; ret 0_2_00AF82E0
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF7FBFh; ret 0_2_00AF831F
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF7FA8h; ret 0_2_00AF834C
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF84BAh; ret 0_2_00AF83E2
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF8426h; ret 0_2_00AF84D8
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF8075h; ret 0_2_00AF84FD
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF808Ch; ret 0_2_00AF8512
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF8B6Fh; ret 0_2_00AF8596
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF8E94h; ret 0_2_00AF85C9
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF878Bh; ret 0_2_00AF8734
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF8D45h; ret 0_2_00AF87D3
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF8E5Fh; ret 0_2_00AF885F
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF8AB5h; ret 0_2_00AF8B13
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AF8550 push 00AF8784h; ret 0_2_00AF8CA1
          Source: I3LPkQh2an.exeStatic PE information: section name: .reloc entropy: 7.938027429915368
          Source: AppVClient.exe.0.drStatic PE information: section name: .reloc entropy: 7.943023114735692
          Source: FXSSVC.exe.0.drStatic PE information: section name: .reloc entropy: 7.949295138244339

          Persistence and Installation Behavior

          barindex
          Source: C:\Windows\System32\AppVClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Roaming\a8a24eee21ca4edc.binJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSystem file written: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSystem file written: C:\Windows\System32\AppVClient.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSystem file written: C:\Windows\System32\FXSSVC.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSystem file written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSystem file written: C:\Windows\System32\alg.exeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile created: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeJump to dropped file
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile created: C:\Windows\System32\AppVClient.exeJump to dropped file
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile created: C:\Windows\System32\FXSSVC.exeJump to dropped file
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile created: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to dropped file
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile created: C:\Windows\System32\alg.exeJump to dropped file
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile created: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeJump to dropped file
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile created: C:\Windows\System32\AppVClient.exeJump to dropped file
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile created: C:\Windows\System32\FXSSVC.exeJump to dropped file
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeFile created: C:\Windows\System32\alg.exeJump to dropped file
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AFCBD0 StrStrIW,CloseHandle,StrStrIW,CloseServiceHandle,OpenServiceW,StrStrIW,_wcslen,ChangeServiceConfigW,StrStrIW,StrStrIW,CloseServiceHandle,CloseHandle,StartServiceW,0_2_00AFCBD0
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004048D7
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00485376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00485376
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00423187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00423187
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_005552A0 GetSystemDefaultLangID, lea ecx, dword ptr [eax-00000419h] lea ecx, dword ptr [eax-00000419h] lea ecx, dword ptr [eax-00000419h] 7_2_005552A0
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeAPI/Special instruction interceptor: Address: E88A14
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0397096E rdtsc 9_2_0397096E
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeDropped PE file which has not been started: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeJump to dropped file
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeDropped PE file which has not been started: C:\Windows\System32\FXSSVC.exeJump to dropped file
          Source: C:\Windows\System32\AppVClient.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeAPI coverage: 4.8 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
          Source: C:\Users\user\Desktop\I3LPkQh2an.exe TID: 7764Thread sleep time: -60000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exe TID: 7872Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0046445A
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046C6D1 FindFirstFileW,FindClose,0_2_0046C6D1
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0046C75C
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046EF95
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046F0F2
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046F3F3
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004637EF
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00463B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00463B12
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0046BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046BCBC
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004049A0
          Source: I3LPkQh2an.exe, 00000000.00000003.1382449777.0000000000EB6000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000003.1389062664.0000000000EB6000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000003.1388701624.0000000000C5A000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000002.1408544408.0000000000CAD000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000002.1409417800.0000000000EB6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: AppVClient.exe, 00000007.00000003.1385254039.00000000005D7000.00000004.00000020.00020000.00000000.sdmp, AppVClient.exe, 00000007.00000002.1394886686.00000000005EE000.00000004.00000020.00020000.00000000.sdmp, AppVClient.exe, 00000007.00000003.1384465016.00000000005D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: appv:SoftwareClients/appv:JavaVirtualMachine
          Source: I3LPkQh2an.exe, 00000000.00000003.1382449777.0000000000E66000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000002.1409417800.0000000000E89000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000003.1389062664.0000000000E86000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWc
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeAPI call chain: ExitProcess graph end nodegraph_0-109275
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeAPI call chain: ExitProcess graph end nodegraph_0-109629
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0397096E rdtsc 9_2_0397096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00417D33 LdrLoadDll,9_2_00417D33
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00473F09 BlockInput,0_2_00473F09
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00403B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00403B3A
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00435A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00435A7C
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00404B37 LoadLibraryA,GetProcAddress,0_2_00404B37
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00574594 mov eax, dword ptr fs:[00000030h]0_2_00574594
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00AD1130 mov eax, dword ptr fs:[00000030h]0_2_00AD1130
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00B13F3D mov eax, dword ptr fs:[00000030h]0_2_00B13F3D
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00E87650 mov eax, dword ptr fs:[00000030h]0_2_00E87650
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00E88CE0 mov eax, dword ptr fs:[00000030h]0_2_00E88CE0
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00E88C80 mov eax, dword ptr fs:[00000030h]0_2_00E88C80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03928397 mov eax, dword ptr fs:[00000030h]9_2_03928397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03928397 mov eax, dword ptr fs:[00000030h]9_2_03928397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03928397 mov eax, dword ptr fs:[00000030h]9_2_03928397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392E388 mov eax, dword ptr fs:[00000030h]9_2_0392E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392E388 mov eax, dword ptr fs:[00000030h]9_2_0392E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392E388 mov eax, dword ptr fs:[00000030h]9_2_0392E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395438F mov eax, dword ptr fs:[00000030h]9_2_0395438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395438F mov eax, dword ptr fs:[00000030h]9_2_0395438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DE3DB mov eax, dword ptr fs:[00000030h]9_2_039DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DE3DB mov eax, dword ptr fs:[00000030h]9_2_039DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DE3DB mov ecx, dword ptr fs:[00000030h]9_2_039DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DE3DB mov eax, dword ptr fs:[00000030h]9_2_039DE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D43D4 mov eax, dword ptr fs:[00000030h]9_2_039D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D43D4 mov eax, dword ptr fs:[00000030h]9_2_039D43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039EC3CD mov eax, dword ptr fs:[00000030h]9_2_039EC3CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A3C0 mov eax, dword ptr fs:[00000030h]9_2_0393A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A3C0 mov eax, dword ptr fs:[00000030h]9_2_0393A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A3C0 mov eax, dword ptr fs:[00000030h]9_2_0393A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A3C0 mov eax, dword ptr fs:[00000030h]9_2_0393A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A3C0 mov eax, dword ptr fs:[00000030h]9_2_0393A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A3C0 mov eax, dword ptr fs:[00000030h]9_2_0393A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039383C0 mov eax, dword ptr fs:[00000030h]9_2_039383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039383C0 mov eax, dword ptr fs:[00000030h]9_2_039383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039383C0 mov eax, dword ptr fs:[00000030h]9_2_039383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039383C0 mov eax, dword ptr fs:[00000030h]9_2_039383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B63C0 mov eax, dword ptr fs:[00000030h]9_2_039B63C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394E3F0 mov eax, dword ptr fs:[00000030h]9_2_0394E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394E3F0 mov eax, dword ptr fs:[00000030h]9_2_0394E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394E3F0 mov eax, dword ptr fs:[00000030h]9_2_0394E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039663FF mov eax, dword ptr fs:[00000030h]9_2_039663FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039403E9 mov eax, dword ptr fs:[00000030h]9_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039403E9 mov eax, dword ptr fs:[00000030h]9_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039403E9 mov eax, dword ptr fs:[00000030h]9_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039403E9 mov eax, dword ptr fs:[00000030h]9_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039403E9 mov eax, dword ptr fs:[00000030h]9_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039403E9 mov eax, dword ptr fs:[00000030h]9_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039403E9 mov eax, dword ptr fs:[00000030h]9_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039403E9 mov eax, dword ptr fs:[00000030h]9_2_039403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392C310 mov ecx, dword ptr fs:[00000030h]9_2_0392C310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A08324 mov eax, dword ptr fs:[00000030h]9_2_03A08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A08324 mov ecx, dword ptr fs:[00000030h]9_2_03A08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A08324 mov eax, dword ptr fs:[00000030h]9_2_03A08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A08324 mov eax, dword ptr fs:[00000030h]9_2_03A08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03950310 mov ecx, dword ptr fs:[00000030h]9_2_03950310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396A30B mov eax, dword ptr fs:[00000030h]9_2_0396A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396A30B mov eax, dword ptr fs:[00000030h]9_2_0396A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396A30B mov eax, dword ptr fs:[00000030h]9_2_0396A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B035C mov eax, dword ptr fs:[00000030h]9_2_039B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B035C mov eax, dword ptr fs:[00000030h]9_2_039B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B035C mov eax, dword ptr fs:[00000030h]9_2_039B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B035C mov ecx, dword ptr fs:[00000030h]9_2_039B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B035C mov eax, dword ptr fs:[00000030h]9_2_039B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B035C mov eax, dword ptr fs:[00000030h]9_2_039B035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FA352 mov eax, dword ptr fs:[00000030h]9_2_039FA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D8350 mov ecx, dword ptr fs:[00000030h]9_2_039D8350
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B2349 mov eax, dword ptr fs:[00000030h]9_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B2349 mov eax, dword ptr fs:[00000030h]9_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B2349 mov eax, dword ptr fs:[00000030h]9_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B2349 mov eax, dword ptr fs:[00000030h]9_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B2349 mov eax, dword ptr fs:[00000030h]9_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B2349 mov eax, dword ptr fs:[00000030h]9_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B2349 mov eax, dword ptr fs:[00000030h]9_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B2349 mov eax, dword ptr fs:[00000030h]9_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B2349 mov eax, dword ptr fs:[00000030h]9_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B2349 mov eax, dword ptr fs:[00000030h]9_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B2349 mov eax, dword ptr fs:[00000030h]9_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B2349 mov eax, dword ptr fs:[00000030h]9_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B2349 mov eax, dword ptr fs:[00000030h]9_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B2349 mov eax, dword ptr fs:[00000030h]9_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B2349 mov eax, dword ptr fs:[00000030h]9_2_039B2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D437C mov eax, dword ptr fs:[00000030h]9_2_039D437C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A0634F mov eax, dword ptr fs:[00000030h]9_2_03A0634F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396E284 mov eax, dword ptr fs:[00000030h]9_2_0396E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396E284 mov eax, dword ptr fs:[00000030h]9_2_0396E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B0283 mov eax, dword ptr fs:[00000030h]9_2_039B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B0283 mov eax, dword ptr fs:[00000030h]9_2_039B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B0283 mov eax, dword ptr fs:[00000030h]9_2_039B0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039402A0 mov eax, dword ptr fs:[00000030h]9_2_039402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039402A0 mov eax, dword ptr fs:[00000030h]9_2_039402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C62A0 mov eax, dword ptr fs:[00000030h]9_2_039C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C62A0 mov ecx, dword ptr fs:[00000030h]9_2_039C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C62A0 mov eax, dword ptr fs:[00000030h]9_2_039C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C62A0 mov eax, dword ptr fs:[00000030h]9_2_039C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C62A0 mov eax, dword ptr fs:[00000030h]9_2_039C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C62A0 mov eax, dword ptr fs:[00000030h]9_2_039C62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A2C3 mov eax, dword ptr fs:[00000030h]9_2_0393A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A2C3 mov eax, dword ptr fs:[00000030h]9_2_0393A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A2C3 mov eax, dword ptr fs:[00000030h]9_2_0393A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A2C3 mov eax, dword ptr fs:[00000030h]9_2_0393A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A2C3 mov eax, dword ptr fs:[00000030h]9_2_0393A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039402E1 mov eax, dword ptr fs:[00000030h]9_2_039402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039402E1 mov eax, dword ptr fs:[00000030h]9_2_039402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039402E1 mov eax, dword ptr fs:[00000030h]9_2_039402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A062D6 mov eax, dword ptr fs:[00000030h]9_2_03A062D6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392823B mov eax, dword ptr fs:[00000030h]9_2_0392823B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392A250 mov eax, dword ptr fs:[00000030h]9_2_0392A250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03936259 mov eax, dword ptr fs:[00000030h]9_2_03936259
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039EA250 mov eax, dword ptr fs:[00000030h]9_2_039EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039EA250 mov eax, dword ptr fs:[00000030h]9_2_039EA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B8243 mov eax, dword ptr fs:[00000030h]9_2_039B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B8243 mov ecx, dword ptr fs:[00000030h]9_2_039B8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E0274 mov eax, dword ptr fs:[00000030h]9_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E0274 mov eax, dword ptr fs:[00000030h]9_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E0274 mov eax, dword ptr fs:[00000030h]9_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E0274 mov eax, dword ptr fs:[00000030h]9_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E0274 mov eax, dword ptr fs:[00000030h]9_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E0274 mov eax, dword ptr fs:[00000030h]9_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E0274 mov eax, dword ptr fs:[00000030h]9_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E0274 mov eax, dword ptr fs:[00000030h]9_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E0274 mov eax, dword ptr fs:[00000030h]9_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E0274 mov eax, dword ptr fs:[00000030h]9_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E0274 mov eax, dword ptr fs:[00000030h]9_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E0274 mov eax, dword ptr fs:[00000030h]9_2_039E0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03934260 mov eax, dword ptr fs:[00000030h]9_2_03934260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03934260 mov eax, dword ptr fs:[00000030h]9_2_03934260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03934260 mov eax, dword ptr fs:[00000030h]9_2_03934260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392826B mov eax, dword ptr fs:[00000030h]9_2_0392826B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A0625D mov eax, dword ptr fs:[00000030h]9_2_03A0625D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B019F mov eax, dword ptr fs:[00000030h]9_2_039B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B019F mov eax, dword ptr fs:[00000030h]9_2_039B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B019F mov eax, dword ptr fs:[00000030h]9_2_039B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B019F mov eax, dword ptr fs:[00000030h]9_2_039B019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392A197 mov eax, dword ptr fs:[00000030h]9_2_0392A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392A197 mov eax, dword ptr fs:[00000030h]9_2_0392A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392A197 mov eax, dword ptr fs:[00000030h]9_2_0392A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03970185 mov eax, dword ptr fs:[00000030h]9_2_03970185
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039EC188 mov eax, dword ptr fs:[00000030h]9_2_039EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039EC188 mov eax, dword ptr fs:[00000030h]9_2_039EC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D4180 mov eax, dword ptr fs:[00000030h]9_2_039D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D4180 mov eax, dword ptr fs:[00000030h]9_2_039D4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A061E5 mov eax, dword ptr fs:[00000030h]9_2_03A061E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AE1D0 mov eax, dword ptr fs:[00000030h]9_2_039AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AE1D0 mov eax, dword ptr fs:[00000030h]9_2_039AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AE1D0 mov ecx, dword ptr fs:[00000030h]9_2_039AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AE1D0 mov eax, dword ptr fs:[00000030h]9_2_039AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AE1D0 mov eax, dword ptr fs:[00000030h]9_2_039AE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F61C3 mov eax, dword ptr fs:[00000030h]9_2_039F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F61C3 mov eax, dword ptr fs:[00000030h]9_2_039F61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039601F8 mov eax, dword ptr fs:[00000030h]9_2_039601F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DA118 mov ecx, dword ptr fs:[00000030h]9_2_039DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DA118 mov eax, dword ptr fs:[00000030h]9_2_039DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DA118 mov eax, dword ptr fs:[00000030h]9_2_039DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DA118 mov eax, dword ptr fs:[00000030h]9_2_039DA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F0115 mov eax, dword ptr fs:[00000030h]9_2_039F0115
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DE10E mov eax, dword ptr fs:[00000030h]9_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DE10E mov ecx, dword ptr fs:[00000030h]9_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DE10E mov eax, dword ptr fs:[00000030h]9_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DE10E mov eax, dword ptr fs:[00000030h]9_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DE10E mov ecx, dword ptr fs:[00000030h]9_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DE10E mov eax, dword ptr fs:[00000030h]9_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DE10E mov eax, dword ptr fs:[00000030h]9_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DE10E mov ecx, dword ptr fs:[00000030h]9_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DE10E mov eax, dword ptr fs:[00000030h]9_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DE10E mov ecx, dword ptr fs:[00000030h]9_2_039DE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03960124 mov eax, dword ptr fs:[00000030h]9_2_03960124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392C156 mov eax, dword ptr fs:[00000030h]9_2_0392C156
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C8158 mov eax, dword ptr fs:[00000030h]9_2_039C8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A04164 mov eax, dword ptr fs:[00000030h]9_2_03A04164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A04164 mov eax, dword ptr fs:[00000030h]9_2_03A04164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03936154 mov eax, dword ptr fs:[00000030h]9_2_03936154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03936154 mov eax, dword ptr fs:[00000030h]9_2_03936154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C4144 mov eax, dword ptr fs:[00000030h]9_2_039C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C4144 mov eax, dword ptr fs:[00000030h]9_2_039C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C4144 mov ecx, dword ptr fs:[00000030h]9_2_039C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C4144 mov eax, dword ptr fs:[00000030h]9_2_039C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C4144 mov eax, dword ptr fs:[00000030h]9_2_039C4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393208A mov eax, dword ptr fs:[00000030h]9_2_0393208A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F60B8 mov eax, dword ptr fs:[00000030h]9_2_039F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F60B8 mov ecx, dword ptr fs:[00000030h]9_2_039F60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039280A0 mov eax, dword ptr fs:[00000030h]9_2_039280A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C80A8 mov eax, dword ptr fs:[00000030h]9_2_039C80A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B20DE mov eax, dword ptr fs:[00000030h]9_2_039B20DE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392C0F0 mov eax, dword ptr fs:[00000030h]9_2_0392C0F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039720F0 mov ecx, dword ptr fs:[00000030h]9_2_039720F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392A0E3 mov ecx, dword ptr fs:[00000030h]9_2_0392A0E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039380E9 mov eax, dword ptr fs:[00000030h]9_2_039380E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B60E0 mov eax, dword ptr fs:[00000030h]9_2_039B60E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394E016 mov eax, dword ptr fs:[00000030h]9_2_0394E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394E016 mov eax, dword ptr fs:[00000030h]9_2_0394E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394E016 mov eax, dword ptr fs:[00000030h]9_2_0394E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394E016 mov eax, dword ptr fs:[00000030h]9_2_0394E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B4000 mov ecx, dword ptr fs:[00000030h]9_2_039B4000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D2000 mov eax, dword ptr fs:[00000030h]9_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D2000 mov eax, dword ptr fs:[00000030h]9_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D2000 mov eax, dword ptr fs:[00000030h]9_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D2000 mov eax, dword ptr fs:[00000030h]9_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D2000 mov eax, dword ptr fs:[00000030h]9_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D2000 mov eax, dword ptr fs:[00000030h]9_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D2000 mov eax, dword ptr fs:[00000030h]9_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D2000 mov eax, dword ptr fs:[00000030h]9_2_039D2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C6030 mov eax, dword ptr fs:[00000030h]9_2_039C6030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392A020 mov eax, dword ptr fs:[00000030h]9_2_0392A020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392C020 mov eax, dword ptr fs:[00000030h]9_2_0392C020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03932050 mov eax, dword ptr fs:[00000030h]9_2_03932050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B6050 mov eax, dword ptr fs:[00000030h]9_2_039B6050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395C073 mov eax, dword ptr fs:[00000030h]9_2_0395C073
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D678E mov eax, dword ptr fs:[00000030h]9_2_039D678E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039307AF mov eax, dword ptr fs:[00000030h]9_2_039307AF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E47A0 mov eax, dword ptr fs:[00000030h]9_2_039E47A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393C7C0 mov eax, dword ptr fs:[00000030h]9_2_0393C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B07C3 mov eax, dword ptr fs:[00000030h]9_2_039B07C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039347FB mov eax, dword ptr fs:[00000030h]9_2_039347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039347FB mov eax, dword ptr fs:[00000030h]9_2_039347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039527ED mov eax, dword ptr fs:[00000030h]9_2_039527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039527ED mov eax, dword ptr fs:[00000030h]9_2_039527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039527ED mov eax, dword ptr fs:[00000030h]9_2_039527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039BE7E1 mov eax, dword ptr fs:[00000030h]9_2_039BE7E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03930710 mov eax, dword ptr fs:[00000030h]9_2_03930710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03960710 mov eax, dword ptr fs:[00000030h]9_2_03960710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396C700 mov eax, dword ptr fs:[00000030h]9_2_0396C700
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396273C mov eax, dword ptr fs:[00000030h]9_2_0396273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396273C mov ecx, dword ptr fs:[00000030h]9_2_0396273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396273C mov eax, dword ptr fs:[00000030h]9_2_0396273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AC730 mov eax, dword ptr fs:[00000030h]9_2_039AC730
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396C720 mov eax, dword ptr fs:[00000030h]9_2_0396C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396C720 mov eax, dword ptr fs:[00000030h]9_2_0396C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03930750 mov eax, dword ptr fs:[00000030h]9_2_03930750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039BE75D mov eax, dword ptr fs:[00000030h]9_2_039BE75D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972750 mov eax, dword ptr fs:[00000030h]9_2_03972750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972750 mov eax, dword ptr fs:[00000030h]9_2_03972750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B4755 mov eax, dword ptr fs:[00000030h]9_2_039B4755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396674D mov esi, dword ptr fs:[00000030h]9_2_0396674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396674D mov eax, dword ptr fs:[00000030h]9_2_0396674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396674D mov eax, dword ptr fs:[00000030h]9_2_0396674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03938770 mov eax, dword ptr fs:[00000030h]9_2_03938770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940770 mov eax, dword ptr fs:[00000030h]9_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940770 mov eax, dword ptr fs:[00000030h]9_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940770 mov eax, dword ptr fs:[00000030h]9_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940770 mov eax, dword ptr fs:[00000030h]9_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940770 mov eax, dword ptr fs:[00000030h]9_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940770 mov eax, dword ptr fs:[00000030h]9_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940770 mov eax, dword ptr fs:[00000030h]9_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940770 mov eax, dword ptr fs:[00000030h]9_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940770 mov eax, dword ptr fs:[00000030h]9_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940770 mov eax, dword ptr fs:[00000030h]9_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940770 mov eax, dword ptr fs:[00000030h]9_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940770 mov eax, dword ptr fs:[00000030h]9_2_03940770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03934690 mov eax, dword ptr fs:[00000030h]9_2_03934690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03934690 mov eax, dword ptr fs:[00000030h]9_2_03934690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039666B0 mov eax, dword ptr fs:[00000030h]9_2_039666B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396C6A6 mov eax, dword ptr fs:[00000030h]9_2_0396C6A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396A6C7 mov ebx, dword ptr fs:[00000030h]9_2_0396A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396A6C7 mov eax, dword ptr fs:[00000030h]9_2_0396A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AE6F2 mov eax, dword ptr fs:[00000030h]9_2_039AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AE6F2 mov eax, dword ptr fs:[00000030h]9_2_039AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AE6F2 mov eax, dword ptr fs:[00000030h]9_2_039AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AE6F2 mov eax, dword ptr fs:[00000030h]9_2_039AE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B06F1 mov eax, dword ptr fs:[00000030h]9_2_039B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B06F1 mov eax, dword ptr fs:[00000030h]9_2_039B06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03972619 mov eax, dword ptr fs:[00000030h]9_2_03972619
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AE609 mov eax, dword ptr fs:[00000030h]9_2_039AE609
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394260B mov eax, dword ptr fs:[00000030h]9_2_0394260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394260B mov eax, dword ptr fs:[00000030h]9_2_0394260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394260B mov eax, dword ptr fs:[00000030h]9_2_0394260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394260B mov eax, dword ptr fs:[00000030h]9_2_0394260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394260B mov eax, dword ptr fs:[00000030h]9_2_0394260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394260B mov eax, dword ptr fs:[00000030h]9_2_0394260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394260B mov eax, dword ptr fs:[00000030h]9_2_0394260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394E627 mov eax, dword ptr fs:[00000030h]9_2_0394E627
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03966620 mov eax, dword ptr fs:[00000030h]9_2_03966620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03968620 mov eax, dword ptr fs:[00000030h]9_2_03968620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393262C mov eax, dword ptr fs:[00000030h]9_2_0393262C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0394C640 mov eax, dword ptr fs:[00000030h]9_2_0394C640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03962674 mov eax, dword ptr fs:[00000030h]9_2_03962674
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F866E mov eax, dword ptr fs:[00000030h]9_2_039F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F866E mov eax, dword ptr fs:[00000030h]9_2_039F866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396A660 mov eax, dword ptr fs:[00000030h]9_2_0396A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396A660 mov eax, dword ptr fs:[00000030h]9_2_0396A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396E59C mov eax, dword ptr fs:[00000030h]9_2_0396E59C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03932582 mov eax, dword ptr fs:[00000030h]9_2_03932582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03932582 mov ecx, dword ptr fs:[00000030h]9_2_03932582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03964588 mov eax, dword ptr fs:[00000030h]9_2_03964588
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039545B1 mov eax, dword ptr fs:[00000030h]9_2_039545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039545B1 mov eax, dword ptr fs:[00000030h]9_2_039545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B05A7 mov eax, dword ptr fs:[00000030h]9_2_039B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B05A7 mov eax, dword ptr fs:[00000030h]9_2_039B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B05A7 mov eax, dword ptr fs:[00000030h]9_2_039B05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039365D0 mov eax, dword ptr fs:[00000030h]9_2_039365D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396A5D0 mov eax, dword ptr fs:[00000030h]9_2_0396A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396A5D0 mov eax, dword ptr fs:[00000030h]9_2_0396A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396E5CF mov eax, dword ptr fs:[00000030h]9_2_0396E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396E5CF mov eax, dword ptr fs:[00000030h]9_2_0396E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395E5E7 mov eax, dword ptr fs:[00000030h]9_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395E5E7 mov eax, dword ptr fs:[00000030h]9_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395E5E7 mov eax, dword ptr fs:[00000030h]9_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395E5E7 mov eax, dword ptr fs:[00000030h]9_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395E5E7 mov eax, dword ptr fs:[00000030h]9_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395E5E7 mov eax, dword ptr fs:[00000030h]9_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395E5E7 mov eax, dword ptr fs:[00000030h]9_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395E5E7 mov eax, dword ptr fs:[00000030h]9_2_0395E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039325E0 mov eax, dword ptr fs:[00000030h]9_2_039325E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396C5ED mov eax, dword ptr fs:[00000030h]9_2_0396C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396C5ED mov eax, dword ptr fs:[00000030h]9_2_0396C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C6500 mov eax, dword ptr fs:[00000030h]9_2_039C6500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A04500 mov eax, dword ptr fs:[00000030h]9_2_03A04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A04500 mov eax, dword ptr fs:[00000030h]9_2_03A04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A04500 mov eax, dword ptr fs:[00000030h]9_2_03A04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A04500 mov eax, dword ptr fs:[00000030h]9_2_03A04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A04500 mov eax, dword ptr fs:[00000030h]9_2_03A04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A04500 mov eax, dword ptr fs:[00000030h]9_2_03A04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A04500 mov eax, dword ptr fs:[00000030h]9_2_03A04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940535 mov eax, dword ptr fs:[00000030h]9_2_03940535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940535 mov eax, dword ptr fs:[00000030h]9_2_03940535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940535 mov eax, dword ptr fs:[00000030h]9_2_03940535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940535 mov eax, dword ptr fs:[00000030h]9_2_03940535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940535 mov eax, dword ptr fs:[00000030h]9_2_03940535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940535 mov eax, dword ptr fs:[00000030h]9_2_03940535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395E53E mov eax, dword ptr fs:[00000030h]9_2_0395E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395E53E mov eax, dword ptr fs:[00000030h]9_2_0395E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395E53E mov eax, dword ptr fs:[00000030h]9_2_0395E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395E53E mov eax, dword ptr fs:[00000030h]9_2_0395E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395E53E mov eax, dword ptr fs:[00000030h]9_2_0395E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03938550 mov eax, dword ptr fs:[00000030h]9_2_03938550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03938550 mov eax, dword ptr fs:[00000030h]9_2_03938550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396656A mov eax, dword ptr fs:[00000030h]9_2_0396656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396656A mov eax, dword ptr fs:[00000030h]9_2_0396656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396656A mov eax, dword ptr fs:[00000030h]9_2_0396656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039EA49A mov eax, dword ptr fs:[00000030h]9_2_039EA49A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039644B0 mov ecx, dword ptr fs:[00000030h]9_2_039644B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039BA4B0 mov eax, dword ptr fs:[00000030h]9_2_039BA4B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039364AB mov eax, dword ptr fs:[00000030h]9_2_039364AB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039304E5 mov ecx, dword ptr fs:[00000030h]9_2_039304E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03968402 mov eax, dword ptr fs:[00000030h]9_2_03968402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03968402 mov eax, dword ptr fs:[00000030h]9_2_03968402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03968402 mov eax, dword ptr fs:[00000030h]9_2_03968402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396A430 mov eax, dword ptr fs:[00000030h]9_2_0396A430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392E420 mov eax, dword ptr fs:[00000030h]9_2_0392E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392E420 mov eax, dword ptr fs:[00000030h]9_2_0392E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392E420 mov eax, dword ptr fs:[00000030h]9_2_0392E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392C427 mov eax, dword ptr fs:[00000030h]9_2_0392C427
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B6420 mov eax, dword ptr fs:[00000030h]9_2_039B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B6420 mov eax, dword ptr fs:[00000030h]9_2_039B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B6420 mov eax, dword ptr fs:[00000030h]9_2_039B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B6420 mov eax, dword ptr fs:[00000030h]9_2_039B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B6420 mov eax, dword ptr fs:[00000030h]9_2_039B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B6420 mov eax, dword ptr fs:[00000030h]9_2_039B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B6420 mov eax, dword ptr fs:[00000030h]9_2_039B6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039EA456 mov eax, dword ptr fs:[00000030h]9_2_039EA456
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392645D mov eax, dword ptr fs:[00000030h]9_2_0392645D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395245A mov eax, dword ptr fs:[00000030h]9_2_0395245A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396E443 mov eax, dword ptr fs:[00000030h]9_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396E443 mov eax, dword ptr fs:[00000030h]9_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396E443 mov eax, dword ptr fs:[00000030h]9_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396E443 mov eax, dword ptr fs:[00000030h]9_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396E443 mov eax, dword ptr fs:[00000030h]9_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396E443 mov eax, dword ptr fs:[00000030h]9_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396E443 mov eax, dword ptr fs:[00000030h]9_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396E443 mov eax, dword ptr fs:[00000030h]9_2_0396E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395A470 mov eax, dword ptr fs:[00000030h]9_2_0395A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395A470 mov eax, dword ptr fs:[00000030h]9_2_0395A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395A470 mov eax, dword ptr fs:[00000030h]9_2_0395A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039BC460 mov ecx, dword ptr fs:[00000030h]9_2_039BC460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940BBE mov eax, dword ptr fs:[00000030h]9_2_03940BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940BBE mov eax, dword ptr fs:[00000030h]9_2_03940BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E4BB0 mov eax, dword ptr fs:[00000030h]9_2_039E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E4BB0 mov eax, dword ptr fs:[00000030h]9_2_039E4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DEBD0 mov eax, dword ptr fs:[00000030h]9_2_039DEBD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03950BCB mov eax, dword ptr fs:[00000030h]9_2_03950BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03950BCB mov eax, dword ptr fs:[00000030h]9_2_03950BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03950BCB mov eax, dword ptr fs:[00000030h]9_2_03950BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03930BCD mov eax, dword ptr fs:[00000030h]9_2_03930BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03930BCD mov eax, dword ptr fs:[00000030h]9_2_03930BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03930BCD mov eax, dword ptr fs:[00000030h]9_2_03930BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03938BF0 mov eax, dword ptr fs:[00000030h]9_2_03938BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03938BF0 mov eax, dword ptr fs:[00000030h]9_2_03938BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03938BF0 mov eax, dword ptr fs:[00000030h]9_2_03938BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395EBFC mov eax, dword ptr fs:[00000030h]9_2_0395EBFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039BCBF0 mov eax, dword ptr fs:[00000030h]9_2_039BCBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AEB1D mov eax, dword ptr fs:[00000030h]9_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AEB1D mov eax, dword ptr fs:[00000030h]9_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AEB1D mov eax, dword ptr fs:[00000030h]9_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AEB1D mov eax, dword ptr fs:[00000030h]9_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AEB1D mov eax, dword ptr fs:[00000030h]9_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AEB1D mov eax, dword ptr fs:[00000030h]9_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AEB1D mov eax, dword ptr fs:[00000030h]9_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AEB1D mov eax, dword ptr fs:[00000030h]9_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AEB1D mov eax, dword ptr fs:[00000030h]9_2_039AEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A04B00 mov eax, dword ptr fs:[00000030h]9_2_03A04B00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395EB20 mov eax, dword ptr fs:[00000030h]9_2_0395EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395EB20 mov eax, dword ptr fs:[00000030h]9_2_0395EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F8B28 mov eax, dword ptr fs:[00000030h]9_2_039F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039F8B28 mov eax, dword ptr fs:[00000030h]9_2_039F8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03928B50 mov eax, dword ptr fs:[00000030h]9_2_03928B50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DEB50 mov eax, dword ptr fs:[00000030h]9_2_039DEB50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E4B4B mov eax, dword ptr fs:[00000030h]9_2_039E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039E4B4B mov eax, dword ptr fs:[00000030h]9_2_039E4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C6B40 mov eax, dword ptr fs:[00000030h]9_2_039C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C6B40 mov eax, dword ptr fs:[00000030h]9_2_039C6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FAB40 mov eax, dword ptr fs:[00000030h]9_2_039FAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D8B42 mov eax, dword ptr fs:[00000030h]9_2_039D8B42
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0392CB7E mov eax, dword ptr fs:[00000030h]9_2_0392CB7E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A02B57 mov eax, dword ptr fs:[00000030h]9_2_03A02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A02B57 mov eax, dword ptr fs:[00000030h]9_2_03A02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A02B57 mov eax, dword ptr fs:[00000030h]9_2_03A02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A02B57 mov eax, dword ptr fs:[00000030h]9_2_03A02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03968A90 mov edx, dword ptr fs:[00000030h]9_2_03968A90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393EA80 mov eax, dword ptr fs:[00000030h]9_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393EA80 mov eax, dword ptr fs:[00000030h]9_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393EA80 mov eax, dword ptr fs:[00000030h]9_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393EA80 mov eax, dword ptr fs:[00000030h]9_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393EA80 mov eax, dword ptr fs:[00000030h]9_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393EA80 mov eax, dword ptr fs:[00000030h]9_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393EA80 mov eax, dword ptr fs:[00000030h]9_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393EA80 mov eax, dword ptr fs:[00000030h]9_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393EA80 mov eax, dword ptr fs:[00000030h]9_2_0393EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A04A80 mov eax, dword ptr fs:[00000030h]9_2_03A04A80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03938AA0 mov eax, dword ptr fs:[00000030h]9_2_03938AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03938AA0 mov eax, dword ptr fs:[00000030h]9_2_03938AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03986AA4 mov eax, dword ptr fs:[00000030h]9_2_03986AA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03930AD0 mov eax, dword ptr fs:[00000030h]9_2_03930AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03964AD0 mov eax, dword ptr fs:[00000030h]9_2_03964AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03964AD0 mov eax, dword ptr fs:[00000030h]9_2_03964AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03986ACC mov eax, dword ptr fs:[00000030h]9_2_03986ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03986ACC mov eax, dword ptr fs:[00000030h]9_2_03986ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03986ACC mov eax, dword ptr fs:[00000030h]9_2_03986ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396AAEE mov eax, dword ptr fs:[00000030h]9_2_0396AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396AAEE mov eax, dword ptr fs:[00000030h]9_2_0396AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039BCA11 mov eax, dword ptr fs:[00000030h]9_2_039BCA11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03954A35 mov eax, dword ptr fs:[00000030h]9_2_03954A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03954A35 mov eax, dword ptr fs:[00000030h]9_2_03954A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396CA38 mov eax, dword ptr fs:[00000030h]9_2_0396CA38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396CA24 mov eax, dword ptr fs:[00000030h]9_2_0396CA24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395EA2E mov eax, dword ptr fs:[00000030h]9_2_0395EA2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03936A50 mov eax, dword ptr fs:[00000030h]9_2_03936A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03936A50 mov eax, dword ptr fs:[00000030h]9_2_03936A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03936A50 mov eax, dword ptr fs:[00000030h]9_2_03936A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03936A50 mov eax, dword ptr fs:[00000030h]9_2_03936A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03936A50 mov eax, dword ptr fs:[00000030h]9_2_03936A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03936A50 mov eax, dword ptr fs:[00000030h]9_2_03936A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03936A50 mov eax, dword ptr fs:[00000030h]9_2_03936A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940A5B mov eax, dword ptr fs:[00000030h]9_2_03940A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03940A5B mov eax, dword ptr fs:[00000030h]9_2_03940A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039ACA72 mov eax, dword ptr fs:[00000030h]9_2_039ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039ACA72 mov eax, dword ptr fs:[00000030h]9_2_039ACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396CA6F mov eax, dword ptr fs:[00000030h]9_2_0396CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396CA6F mov eax, dword ptr fs:[00000030h]9_2_0396CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396CA6F mov eax, dword ptr fs:[00000030h]9_2_0396CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039DEA60 mov eax, dword ptr fs:[00000030h]9_2_039DEA60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B89B3 mov esi, dword ptr fs:[00000030h]9_2_039B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B89B3 mov eax, dword ptr fs:[00000030h]9_2_039B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B89B3 mov eax, dword ptr fs:[00000030h]9_2_039B89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039429A0 mov eax, dword ptr fs:[00000030h]9_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039429A0 mov eax, dword ptr fs:[00000030h]9_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039429A0 mov eax, dword ptr fs:[00000030h]9_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039429A0 mov eax, dword ptr fs:[00000030h]9_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039429A0 mov eax, dword ptr fs:[00000030h]9_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039429A0 mov eax, dword ptr fs:[00000030h]9_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039429A0 mov eax, dword ptr fs:[00000030h]9_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039429A0 mov eax, dword ptr fs:[00000030h]9_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039429A0 mov eax, dword ptr fs:[00000030h]9_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039429A0 mov eax, dword ptr fs:[00000030h]9_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039429A0 mov eax, dword ptr fs:[00000030h]9_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039429A0 mov eax, dword ptr fs:[00000030h]9_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039429A0 mov eax, dword ptr fs:[00000030h]9_2_039429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039309AD mov eax, dword ptr fs:[00000030h]9_2_039309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039309AD mov eax, dword ptr fs:[00000030h]9_2_039309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A9D0 mov eax, dword ptr fs:[00000030h]9_2_0393A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A9D0 mov eax, dword ptr fs:[00000030h]9_2_0393A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A9D0 mov eax, dword ptr fs:[00000030h]9_2_0393A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A9D0 mov eax, dword ptr fs:[00000030h]9_2_0393A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A9D0 mov eax, dword ptr fs:[00000030h]9_2_0393A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0393A9D0 mov eax, dword ptr fs:[00000030h]9_2_0393A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039649D0 mov eax, dword ptr fs:[00000030h]9_2_039649D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FA9D3 mov eax, dword ptr fs:[00000030h]9_2_039FA9D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C69C0 mov eax, dword ptr fs:[00000030h]9_2_039C69C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039629F9 mov eax, dword ptr fs:[00000030h]9_2_039629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039629F9 mov eax, dword ptr fs:[00000030h]9_2_039629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039BE9E0 mov eax, dword ptr fs:[00000030h]9_2_039BE9E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039BC912 mov eax, dword ptr fs:[00000030h]9_2_039BC912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03928918 mov eax, dword ptr fs:[00000030h]9_2_03928918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03928918 mov eax, dword ptr fs:[00000030h]9_2_03928918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AE908 mov eax, dword ptr fs:[00000030h]9_2_039AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039AE908 mov eax, dword ptr fs:[00000030h]9_2_039AE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B892A mov eax, dword ptr fs:[00000030h]9_2_039B892A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039C892B mov eax, dword ptr fs:[00000030h]9_2_039C892B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039B0946 mov eax, dword ptr fs:[00000030h]9_2_039B0946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A04940 mov eax, dword ptr fs:[00000030h]9_2_03A04940
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D4978 mov eax, dword ptr fs:[00000030h]9_2_039D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039D4978 mov eax, dword ptr fs:[00000030h]9_2_039D4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039BC97C mov eax, dword ptr fs:[00000030h]9_2_039BC97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03956962 mov eax, dword ptr fs:[00000030h]9_2_03956962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03956962 mov eax, dword ptr fs:[00000030h]9_2_03956962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03956962 mov eax, dword ptr fs:[00000030h]9_2_03956962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0397096E mov eax, dword ptr fs:[00000030h]9_2_0397096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0397096E mov edx, dword ptr fs:[00000030h]9_2_0397096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0397096E mov eax, dword ptr fs:[00000030h]9_2_0397096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039BC89D mov eax, dword ptr fs:[00000030h]9_2_039BC89D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03930887 mov eax, dword ptr fs:[00000030h]9_2_03930887
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0395E8C0 mov eax, dword ptr fs:[00000030h]9_2_0395E8C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03A008C0 mov eax, dword ptr fs:[00000030h]9_2_03A008C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396C8F9 mov eax, dword ptr fs:[00000030h]9_2_0396C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0396C8F9 mov eax, dword ptr fs:[00000030h]9_2_0396C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039FA8E4 mov eax, dword ptr fs:[00000030h]9_2_039FA8E4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_039BC810 mov eax, dword ptr fs:[00000030h]9_2_039BC810
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004580A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_004580A9
          Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0042A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A155
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0042A124 SetUnhandledExceptionFilter,0_2_0042A124
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00B11361 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B11361
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00B14C7B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00B14C7B

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeNtOpenKeyEx: Indirect: 0x140077B9BJump to behavior
          Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeNtQueryValueKey: Indirect: 0x140077C9FJump to behavior
          Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeNtClose: Indirect: 0x140077E81
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2CBF008Jump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004587B1 LogonUserW,0_2_004587B1
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00403B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00403B3A
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004048D7
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00464C53 mouse_event,0_2_00464C53
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\I3LPkQh2an.exe"Jump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00457CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00457CAF
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0045874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0045874B
          Source: I3LPkQh2an.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
          Source: I3LPkQh2an.exeBinary or memory string: Shell_TrayWnd
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_0042862B cpuid 0_2_0042862B
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\AppVClient.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00434E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00434E87
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00441E06 GetUserNameW,0_2_00441E06
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00433F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00433F3A
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_004049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004049A0

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 9.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.1738864587.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.1740236285.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: I3LPkQh2an.exeBinary or memory string: WIN_81
          Source: I3LPkQh2an.exeBinary or memory string: WIN_XP
          Source: I3LPkQh2an.exeBinary or memory string: WIN_XPe
          Source: I3LPkQh2an.exeBinary or memory string: WIN_VISTA
          Source: I3LPkQh2an.exeBinary or memory string: WIN_7
          Source: I3LPkQh2an.exeBinary or memory string: WIN_8
          Source: I3LPkQh2an.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 9.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.1738864587.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.1740236285.0000000003690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00476283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00476283
          Source: C:\Users\user\Desktop\I3LPkQh2an.exeCode function: 0_2_00476747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476747
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure2
          Valid Accounts
          2
          Native API
          2
          LSASS Driver
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          21
          Input Capture
          2
          System Time Discovery
          1
          Taint Shared Content
          1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts2
          Service Execution
          1
          DLL Side-Loading
          1
          Abuse Elevation Control Mechanism
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory1
          Account Discovery
          Remote Desktop Protocol21
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAt2
          Valid Accounts
          2
          LSASS Driver
          1
          Abuse Elevation Control Mechanism
          Security Account Manager1
          File and Directory Discovery
          SMB/Windows Admin Shares3
          Clipboard Data
          2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCron1
          Windows Service
          1
          DLL Side-Loading
          3
          Obfuscated Files or Information
          NTDS125
          System Information Discovery
          Distributed Component Object ModelInput Capture12
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
          Valid Accounts
          1
          Software Packing
          LSA Secrets251
          Security Software Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts21
          Access Token Manipulation
          1
          Timestomp
          Cached Domain Credentials2
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
          Windows Service
          1
          DLL Side-Loading
          DCSync3
          Process Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/Job212
          Process Injection
          222
          Masquerading
          Proc Filesystem1
          Application Window Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
          Valid Accounts
          /etc/passwd and /etc/shadow1
          System Owner/User Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
          Virtualization/Sandbox Evasion
          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd21
          Access Token Manipulation
          Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
          Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task212
          Process Injection
          KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588101 Sample: I3LPkQh2an.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 28 zlenh.biz 2->28 30 uhxqin.biz 2->30 32 7 other IPs or domains 2->32 38 Suricata IDS alerts for network traffic 2->38 40 Antivirus detection for URL or domain 2->40 42 Antivirus detection for dropped file 2->42 44 7 other signatures 2->44 7 I3LPkQh2an.exe 3 2->7         started        12 AppVClient.exe 1 2->12         started        14 alg.exe 2->14         started        16 6 other processes 2->16 signatures3 process4 dnsIp5 34 ssbzmoy.biz 18.141.10.107, 49739, 49758, 49795 AMAZON-02US United States 7->34 36 pywolwnvd.biz 54.244.188.177, 49733, 49750, 49751 AMAZON-02US United States 7->36 20 C:\Windows\System32\alg.exe, PE32+ 7->20 dropped 22 C:\Windows\System32\FXSSVC.exe, PE32+ 7->22 dropped 24 DiagnosticsHub.Sta...llector.Service.exe, PE32+ 7->24 dropped 26 2 other malicious files 7->26 dropped 46 Binary is likely a compiled AutoIt script file 7->46 48 Writes to foreign memory regions 7->48 50 Maps a DLL or memory area into another process 7->50 62 3 other signatures 7->62 18 svchost.exe 7->18         started        52 Antivirus detection for dropped file 12->52 54 Creates files in the system32 config directory 12->54 56 Machine Learning detection for dropped file 12->56 58 Contains functionality to behave differently if execute on a Russian/Kazak computer 12->58 60 Found direct / indirect Syscall (likely to bypass EDR) 16->60 file6 signatures7 process8

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          I3LPkQh2an.exe87%ReversingLabsWin32.Virus.Expiro
          I3LPkQh2an.exe75%VirustotalBrowse
          I3LPkQh2an.exe100%AviraW32/Infector.Gen
          I3LPkQh2an.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe100%AviraW32/Infector.Gen
          C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe100%AviraW32/Infector.Gen
          C:\Windows\System32\AppVClient.exe100%AviraW32/Infector.Gen
          C:\Windows\System32\FXSSVC.exe100%AviraW32/Infector.Gen
          C:\Windows\System32\alg.exe100%AviraW32/Infector.Gen
          C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe100%Joe Sandbox ML
          C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe100%Joe Sandbox ML
          C:\Windows\System32\AppVClient.exe100%Joe Sandbox ML
          C:\Windows\System32\FXSSVC.exe100%Joe Sandbox ML
          C:\Windows\System32\alg.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://18.141.10.107/cle0%Avira URL Cloudsafe
          http://54.244.188.177/w100%Avira URL Cloudmalware
          http://54.244.188.177/H100%Avira URL Cloudmalware
          http://54.244.188.177/wbjqiahuptwvbQ(100%Avira URL Cloudmalware
          http://54.244.188.177/w)100%Avira URL Cloudmalware
          http://54.244.188.177:80/wbjqiahuptwvb100%Avira URL Cloudmalware
          http://54.244.188.177/O100%Avira URL Cloudmalware
          http://54.244.188.177/z100%Avira URL Cloudmalware
          http://54.244.188.177/q100%Avira URL Cloudmalware
          http://54.244.188.177/100%Avira URL Cloudmalware
          http://54.244.188.177/wbjqiahuptwvb100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          cvgrf.biz
          54.244.188.177
          truefalse
            high
            s-part-0017.t-0009.t-msedge.net
            13.107.246.45
            truefalse
              high
              ssbzmoy.biz
              18.141.10.107
              truefalse
                high
                pywolwnvd.biz
                54.244.188.177
                truefalse
                  high
                  time.windows.com
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://dwrqljrr.biz/wfnlorhejqfnrfalse
                      high
                      http://warkcdu.biz/gloumaahxxajxffalse
                        high
                        http://cvgrf.biz/wbjqiahuptwvbfalse
                          high
                          http://lrxdmhrr.biz/rwlfutjcpfalse
                            high
                            http://lrxdmhrr.biz/ibckscxhsodddaetfalse
                              high
                              http://ssbzmoy.biz/clefalse
                                high
                                http://vcddkls.biz/ycqjghyfalse
                                  high
                                  http://ssbzmoy.biz/mxefalse
                                    high
                                    http://oshhkdluh.biz/agqwjlvfalse
                                      high
                                      http://acwjcqqv.biz/hchfalse
                                        high
                                        http://pywolwnvd.biz/osbofalse
                                          high
                                          http://pywolwnvd.biz/wfalse
                                            high
                                            http://acwjcqqv.biz/tfdfalse
                                              high
                                              http://cvgrf.biz/pajihutcfilntmfalse
                                                high
                                                http://wllvnzb.biz/shvehxfalse
                                                  high
                                                  http://knjghuig.biz/voucowxceexfalse
                                                    high
                                                    NameSourceMaliciousAntivirus DetectionReputation
                                                    http://18.141.10.107/cleI3LPkQh2an.exe, 00000000.00000002.1409417800.0000000000EB6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://54.244.188.177/w)I3LPkQh2an.exe, 00000000.00000003.1388701624.0000000000CDC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    http://pywolwnvd.biz/NI3LPkQh2an.exe, 00000000.00000002.1408544408.0000000000C18000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://18.141.10.107/I3LPkQh2an.exe, 00000000.00000002.1408544408.0000000000CAD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://54.244.188.177/qI3LPkQh2an.exe, 00000000.00000002.1409100605.0000000000E5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        http://54.244.188.177/wI3LPkQh2an.exe, 00000000.00000003.1388701624.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000003.1388701624.0000000000CDC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        http://54.244.188.177/zI3LPkQh2an.exe, 00000000.00000002.1409100605.0000000000E5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        http://54.244.188.177/wbjqiahuptwvbQ(I3LPkQh2an.exe, 00000000.00000002.1408544408.0000000000CF8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        http://54.244.188.177:80/wbjqiahuptwvbI3LPkQh2an.exe, 00000000.00000002.1409100605.0000000000D10000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        http://54.244.188.177/HI3LPkQh2an.exe, 00000000.00000002.1409100605.0000000000E5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        http://54.244.188.177/OI3LPkQh2an.exe, 00000000.00000002.1409100605.0000000000E5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        http://54.244.188.177/I3LPkQh2an.exe, 00000000.00000002.1408544408.0000000000CDC000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000002.1409100605.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000003.1388701624.0000000000CDC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        http://54.244.188.177/wbjqiahuptwvbI3LPkQh2an.exe, 00000000.00000002.1408544408.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000002.1409100605.0000000000D10000.00000004.00000020.00020000.00000000.sdmp, I3LPkQh2an.exe, 00000000.00000002.1408544408.0000000000CDC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        54.244.188.177
                                                        cvgrf.bizUnited States
                                                        16509AMAZON-02USfalse
                                                        18.141.10.107
                                                        ssbzmoy.bizUnited States
                                                        16509AMAZON-02USfalse
                                                        Joe Sandbox version:42.0.0 Malachite
                                                        Analysis ID:1588101
                                                        Start date and time:2025-01-10 21:23:07 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 8m 38s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:13
                                                        Number of new started drivers analysed:3
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:I3LPkQh2an.exe
                                                        renamed because original name is a hash value
                                                        Original Sample Name:f9d78174d15fee469beb09ad3a07fb4a87333cd00477b8dc934568edcb959738.exe
                                                        Detection:MAL
                                                        Classification:mal100.spre.troj.expl.evad.winEXE@8/10@7/2
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HCA Information:
                                                        • Successful, ratio: 69%
                                                        • Number of executed functions: 62
                                                        • Number of non-executed functions: 252
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, DiagnosticsHub.StandardCollector.Service.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                        • Excluded IPs from analysis (whitelisted): 20.101.57.9, 13.107.246.45, 20.12.23.50, 4.245.163.56
                                                        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, vjaxhpbji.biz, ytctnunms.biz, lrxdmhrr.biz, vrrazpdh.biz, tbjrpv.biz, xlfhhhm.biz, warkcdu.biz, npukfztj.biz, anpmnmxo.biz, sxmiywsfv.biz, przvgke.biz, ww7.przvgke.biz, dwrqljrr.biz, gytujflc.biz, gvijgjwkh.biz, zjbpaao.biz, gnqgo.biz, deoci.biz, iuzpxe.biz, nqwjmb.biz, wllvnzb.biz, lpuegx.biz, bumxkqgxu.biz, yhqqc.biz, vcddkls.biz, vyome.biz, dlynankz.biz, gcedd.biz, ww12.fwiwk.biz, oshhkdluh.biz, opowhhece.biz, twc.trafficmanager.net, otelrules.afd.azureedge.net, jpskm.biz, ftxlah.biz, ifsaia.biz, uhxqin.biz, oflybfv.biz, jhvzpcfg.biz, saytjshyf.biz, fwiwk.biz, typgfhb.biz, esuzf.biz, zlenh.biz, myups.biz, otelrules.azureedge.net, yauexmxk.biz, knjghuig.biz, yunalwv.biz, ctldl.windowsupdate.com, brsua.biz, fe3cr.delivery.mp.microsoft.com, ww12.przvgke.biz, mgmsclkyu.biz, qaynky.biz, lejtdj.biz, qpnczch.biz, mnjmhp.biz, azureedge-t-prod.trafficmanager.net, acwjcqqv.biz, jdhhbs.biz
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                        TimeTypeDescription
                                                        15:24:16API Interceptor2x Sleep call for process: I3LPkQh2an.exe modified
                                                        15:24:50API Interceptor3x Sleep call for process: svchost.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        54.244.188.177OVZizpEU7Q.exeGet hashmaliciousFormBookBrowse
                                                        • pywolwnvd.biz/wlyolqts
                                                        RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                        • lrxdmhrr.biz/tbbwyfgx
                                                        PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                        • lrxdmhrr.biz/fncvigkebkn
                                                        REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                        • cvgrf.biz/dy
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • cvgrf.biz/ubwy
                                                        INV_NE_02_2034388.exeGet hashmaliciousFormBookBrowse
                                                        • cvgrf.biz/mddjrljmh
                                                        Shipment Notification.exeGet hashmaliciousFormBookBrowse
                                                        • cvgrf.biz/pm
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • cvgrf.biz/yfypviummaqwyuq
                                                        MA-DS-2024-03 URGENT.exeGet hashmaliciousFormBookBrowse
                                                        • pywolwnvd.biz/usxsp
                                                        Request for Quotation.exeGet hashmaliciousFormBookBrowse
                                                        • cvgrf.biz/iropyruplkan
                                                        18.141.10.107RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                        • warkcdu.biz/d
                                                        PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                        • vcddkls.biz/we
                                                        REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                        • vcddkls.biz/kknpblsbxdrrjko
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • knjghuig.biz/nfm
                                                        INV_NE_02_2034388.exeGet hashmaliciousFormBookBrowse
                                                        • vcddkls.biz/x
                                                        Shipment Notification.exeGet hashmaliciousFormBookBrowse
                                                        • knjghuig.biz/hsyjdjsftfdjf
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • vcddkls.biz/lqpvpf
                                                        Request for Quotation.exeGet hashmaliciousFormBookBrowse
                                                        • vcddkls.biz/ytpebbldheutao
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • vcddkls.biz/ymdlhl
                                                        PURCHASE REQUIRED DETAILS 000487958790903403.exeGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                        • knjghuig.biz/jedofahyn
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        cvgrf.bizRJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                        • 54.244.188.177
                                                        PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                        • 54.244.188.177
                                                        REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 54.244.188.177
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 54.244.188.177
                                                        INV_NE_02_2034388.exeGet hashmaliciousFormBookBrowse
                                                        • 54.244.188.177
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 54.244.188.177
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 54.244.188.177
                                                        PURCHASE REQUIRED DETAILS 000487958790903403.exeGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                        • 54.244.188.177
                                                        Ziraat_Swift.htaGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                        • 54.244.188.177
                                                        s-part-0017.t-0009.t-msedge.net295963673155714664.jsGet hashmaliciousStrela DownloaderBrowse
                                                        • 13.107.246.45
                                                        24928193762733825739.jsGet hashmaliciousStrela DownloaderBrowse
                                                        • 13.107.246.45
                                                        FUEvp5c8lO.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                        • 13.107.246.45
                                                        http://unikuesolutions.com/ck/bd/%7BRANDOM_NUMBER05%7D/YmVuc29uLmxpbkB2aGFjb3JwLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                        • 13.107.246.45
                                                        Bontrageroutdoors_Project_Update_202557516.pdfGet hashmaliciousUnknownBrowse
                                                        • 13.107.246.45
                                                        AuKUol8SPU.exeGet hashmaliciousFormBookBrowse
                                                        • 13.107.246.45
                                                        1358019715229232264.jsGet hashmaliciousStrela DownloaderBrowse
                                                        • 13.107.246.45
                                                        https://probashkontho.com/work/Organization/privacy/index_.htmlGet hashmaliciousUnknownBrowse
                                                        • 13.107.246.45
                                                        ZV2G9QQzlR.exeGet hashmaliciousFormBookBrowse
                                                        • 13.107.246.45
                                                        OVZizpEU7Q.exeGet hashmaliciousFormBookBrowse
                                                        • 13.107.246.45
                                                        ssbzmoy.bizOVZizpEU7Q.exeGet hashmaliciousFormBookBrowse
                                                        • 18.141.10.107
                                                        RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                        • 18.141.10.107
                                                        PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                        • 18.141.10.107
                                                        REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 18.141.10.107
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 18.141.10.107
                                                        INV_NE_02_2034388.exeGet hashmaliciousFormBookBrowse
                                                        • 18.141.10.107
                                                        Shipment Notification.exeGet hashmaliciousFormBookBrowse
                                                        • 18.141.10.107
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 18.141.10.107
                                                        Request for Quotation.exeGet hashmaliciousFormBookBrowse
                                                        • 18.141.10.107
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 18.141.10.107
                                                        pywolwnvd.bizOVZizpEU7Q.exeGet hashmaliciousFormBookBrowse
                                                        • 54.244.188.177
                                                        RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                        • 54.244.188.177
                                                        PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                        • 54.244.188.177
                                                        REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 54.244.188.177
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 54.244.188.177
                                                        INV_NE_02_2034388.exeGet hashmaliciousFormBookBrowse
                                                        • 54.244.188.177
                                                        Shipment Notification.exeGet hashmaliciousFormBookBrowse
                                                        • 54.244.188.177
                                                        HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                        • 54.244.188.177
                                                        MA-DS-2024-03 URGENT.exeGet hashmaliciousFormBookBrowse
                                                        • 54.244.188.177
                                                        Request for Quotation.exeGet hashmaliciousFormBookBrowse
                                                        • 54.244.188.177
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        AMAZON-02USstatement.docGet hashmaliciousKnowBe4Browse
                                                        • 52.217.123.201
                                                        9MZZG92yMO.exeGet hashmaliciousFormBookBrowse
                                                        • 76.223.67.189
                                                        aBEh0fsi2c.exeGet hashmaliciousFormBookBrowse
                                                        • 13.248.169.48
                                                        EIvidclKOb.exeGet hashmaliciousFormBookBrowse
                                                        • 13.228.81.39
                                                        invoice_AG60538.pdfGet hashmaliciousUnknownBrowse
                                                        • 143.204.205.214
                                                        bkTW1FbgHN.exeGet hashmaliciousFormBookBrowse
                                                        • 18.139.62.226
                                                        OVZizpEU7Q.exeGet hashmaliciousFormBookBrowse
                                                        • 54.244.188.177
                                                        QmBbqpEHu0.exeGet hashmaliciousFormBookBrowse
                                                        • 13.248.169.48
                                                        frosty.arm.elfGet hashmaliciousMiraiBrowse
                                                        • 18.140.171.98
                                                        frosty.spc.elfGet hashmaliciousMiraiBrowse
                                                        • 54.189.236.62
                                                        AMAZON-02USstatement.docGet hashmaliciousKnowBe4Browse
                                                        • 52.217.123.201
                                                        9MZZG92yMO.exeGet hashmaliciousFormBookBrowse
                                                        • 76.223.67.189
                                                        aBEh0fsi2c.exeGet hashmaliciousFormBookBrowse
                                                        • 13.248.169.48
                                                        EIvidclKOb.exeGet hashmaliciousFormBookBrowse
                                                        • 13.228.81.39
                                                        invoice_AG60538.pdfGet hashmaliciousUnknownBrowse
                                                        • 143.204.205.214
                                                        bkTW1FbgHN.exeGet hashmaliciousFormBookBrowse
                                                        • 18.139.62.226
                                                        OVZizpEU7Q.exeGet hashmaliciousFormBookBrowse
                                                        • 54.244.188.177
                                                        QmBbqpEHu0.exeGet hashmaliciousFormBookBrowse
                                                        • 13.248.169.48
                                                        frosty.arm.elfGet hashmaliciousMiraiBrowse
                                                        • 18.140.171.98
                                                        frosty.spc.elfGet hashmaliciousMiraiBrowse
                                                        • 54.189.236.62
                                                        No context
                                                        No context
                                                        Process:C:\Users\user\Desktop\I3LPkQh2an.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1658880
                                                        Entropy (8bit):4.312993604615422
                                                        Encrypted:false
                                                        SSDEEP:24576:kxGBcmlyVg9N9JMlDlfjRiVuVsWt5MJMs:wGy+egFIDRRAubt5M
                                                        MD5:FD31927032749FC47370737BE446DF49
                                                        SHA1:924E2847BA881ECABAA8F2473F019A970F264F71
                                                        SHA-256:0CE4ABE5539BA68DC94F1B5E135F78F59F1A60D31A846689E31FA196DFB04ACF
                                                        SHA-512:395B004FCE7F06AF2072942D92F6F8D10AB1D8394D99B0333FD11A5AFB27EFA91A72A71697F1490F71D4FF63994D4AA9EB3497BFE73B6B91E9C63CA8C00D2598
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        Reputation:low
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........]...3...3...3...0...3...6.h.3.,.7...3.,.0...3.,.6...3...7...3...2...3...2.G.3.e.:...3.e....3.....3.e.1...3.Rich..3.................PE..L...}..d..........................................@.................................Y.......................................`D......................................@...p...........................p...@....................B.......................text.............................. ..`.rdata..t...........................@..@.data........`.......@..............@....didat..4............N..............@....rsrc................P..............@..@.reloc...............`..............@...........................................................................................................................................................................................................................................................
                                                        Process:C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):3141
                                                        Entropy (8bit):4.809636404857026
                                                        Encrypted:false
                                                        SSDEEP:24:L+d+4N1Qn2XzRFZWtrmZWmIr+bGpBoBHZWqroJ5fZWlbrZW07r7ROWZWqNr3C22c:quSRqBmNGlrs6xqo9tnaD
                                                        MD5:C17C44CFF1BC754A8532E2A8CE12505D
                                                        SHA1:B22BD18E40A5A4D57F2B23612696AD6818B7EF8C
                                                        SHA-256:AFF99D10DD14E5385922D85629C72222CCDE4A50AB8C3106DB0D54CE75CBDD84
                                                        SHA-512:B73F2AB4F4E907B2E273F8C14450DCA47162A417112F2D39DDC9B21ECB01CAAAC4200BFD6A4DDDB00D3D3ACFD36DF9A2DF7844AF4BB025B952E0D61BF0178A0E
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:2025-01-10 15:24:21-0500: Disabled unneeded token privilege: SeAssignPrimaryTokenPrivilege...2025-01-10 15:24:21-0500: Disabled unneeded token privilege: SeAuditPrivilege...2025-01-10 15:24:21-0500: Disabled unneeded token privilege: SeBackupPrivilege...2025-01-10 15:24:21-0500: Disabled unneeded token privilege: SeCreateGlobalPrivilege...2025-01-10 15:24:21-0500: Disabled unneeded token privilege: SeCreatePagefilePrivilege...2025-01-10 15:24:21-0500: Disabled unneeded token privilege: SeCreatePermanentPrivilege...2025-01-10 15:24:21-0500: Disabled unneeded token privilege: SeCreateSymbolicLinkPrivilege...2025-01-10 15:24:21-0500: Could not disable token privilege value: SeCreateTokenPrivilege. (1300)..2025-01-10 15:24:21-0500: Disabled unneeded token privilege: SeDebugPrivilege...2025-01-10 15:24:21-0500: Could not disable token privilege value: SeEnableDelegationPrivilege. (1300)..2025-01-10 15:24:21-0500: Disabled unneeded token privilege: SeImpersonatePrivilege...2025-01-10 15:24:2
                                                        Process:C:\Users\user\Desktop\I3LPkQh2an.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):288768
                                                        Entropy (8bit):7.995165562430459
                                                        Encrypted:true
                                                        SSDEEP:6144:6Ypmu6UEvr9xFVorU2voYB+/6AY4ij/sUxCwlPP+vS:6YpmuJEvBx/d2b+iOiIUDx2K
                                                        MD5:F8BF28E8F7C884D43294055E7E5E00A6
                                                        SHA1:B7EC368487458794CC20D3C200F97F0CA4F855ED
                                                        SHA-256:2CA8463CC1A47B47FFE7D2D9B19A551177A31BEB0BAA0908F8E0111072349094
                                                        SHA-512:CBE50043B3EDD9DB05A668D799A79564B94DF49C2151B10EB5C72EECB20585292E6BE15B55CD15DD0B2FCAC35BD8A8E88794498D755FE9DEE52418EB67044CBC
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:}..G6A2EI2N0..UC.H80TOG5.2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TO.5A2KR.@0.Q.b.It.u./\2.5?])B 5u R&V_ o%Pa@0#.'^a....%WT1aJ8K.EM2N0AX,B:..P3.zU&.x-U.*..yS/.*...!U.W...}82.a![Xi/ .A2EM2N0A..C3.91T....2EM2N0AX.C1I31_OGcE2EM2N0AXUC&H80DOG516EM2.0AHUC3J80ROG5A2EM4N0AXUC3HH4TOE5A2EM2L0..UC#H8 TOG5Q2E]2N0AXUS3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AX{7V0L0TO.`E2E]2N0.\UC#H80TOG5A2EM2N0aXU#3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0
                                                        Process:C:\Users\user\Desktop\I3LPkQh2an.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):288768
                                                        Entropy (8bit):7.995165562430459
                                                        Encrypted:true
                                                        SSDEEP:6144:6Ypmu6UEvr9xFVorU2voYB+/6AY4ij/sUxCwlPP+vS:6YpmuJEvBx/d2b+iOiIUDx2K
                                                        MD5:F8BF28E8F7C884D43294055E7E5E00A6
                                                        SHA1:B7EC368487458794CC20D3C200F97F0CA4F855ED
                                                        SHA-256:2CA8463CC1A47B47FFE7D2D9B19A551177A31BEB0BAA0908F8E0111072349094
                                                        SHA-512:CBE50043B3EDD9DB05A668D799A79564B94DF49C2151B10EB5C72EECB20585292E6BE15B55CD15DD0B2FCAC35BD8A8E88794498D755FE9DEE52418EB67044CBC
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:}..G6A2EI2N0..UC.H80TOG5.2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TO.5A2KR.@0.Q.b.It.u./\2.5?])B 5u R&V_ o%Pa@0#.'^a....%WT1aJ8K.EM2N0AX,B:..P3.zU&.x-U.*..yS/.*...!U.W...}82.a![Xi/ .A2EM2N0A..C3.91T....2EM2N0AX.C1I31_OGcE2EM2N0AXUC&H80DOG516EM2.0AHUC3J80ROG5A2EM4N0AXUC3HH4TOE5A2EM2L0..UC#H8 TOG5Q2E]2N0AXUS3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AX{7V0L0TO.`E2E]2N0.\UC#H80TOG5A2EM2N0aXU#3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0AXUC3H80TOG5A2EM2N0
                                                        Process:C:\Users\user\Desktop\I3LPkQh2an.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):12320
                                                        Entropy (8bit):7.98443877202933
                                                        Encrypted:false
                                                        SSDEEP:384:TxJmhXWECasVSQbp3aUvx4lMolWXvBFqr3R4/:TrmldQRaU54+olS3W3Rw
                                                        MD5:25B97F882FC50608482CFA3F0DFB5828
                                                        SHA1:2177B0DE40154EE8736B3BAEFD76B11EC7D99997
                                                        SHA-256:9746F510BB8E88F0C57AEA381253D2EE53CB0EB786FD6B7E8B82D895BA92E644
                                                        SHA-512:E21BC656B87E1E6EC36A85A3C7D374EC14F005422C1CA0DA31FCDFD3D8AEB66054BBF3DFA2A70AD573115B64D9AA2F614E715F63C56B93EFD736C7F506CCCE03
                                                        Malicious:false
                                                        Preview:....Qj..B..W..~[..P......2T..c.l.a..(....<.C.2.t..d...Y....1...f...NM!C..C`.[..-kRZQr.P..H..=tK|.n..a.wV...V.:3.....).S...\y'%.F.....<JXJp. ...O..4v.r.b...T.W.K.%'E!..$.j.N..f....qo.......W.......=....+..../.X6......9..S.....i6.Z..qO..ql.O....N..,K^....e.Hf... .....-!..J.}.`J.y._..c... .J=....{.[n....<.....V......HL........jYp.?....~l.+.............P.^@.L..h.lf.ju.V...}./..R.d..r.../.ya...^.\.....ID.r......>.2..w.Or.E.9).......%.r.....-.....|.....V.gJ....u.-.W......l..d2N..........K....B.J..gZ.!..NX.3..+V...{..wC..6.....V......\....5.S2.....%.Tfq..@.d.X......O2....n...ZQ,.4..83..EP.q..$z.....uL..euh.p..`o...A..7-t\c9.zei.......q....%..q.....2U...H.Oy...]s..u...BJ..:p.-...u.Y.......|..d$VQ..&T3.4..8\|..tQ.W..\...2^./...>.;w...\..>.d89).:1.<.1Du1_g....61.......G...K.d....JLh.ZF.K=^...U7....c.....@Bk..=.. .P..j...q.N......6f..eNP.....@!.F..&.u.....t....8#c.G.U.v........G`9&..L...>....m...g...$....gn17,j.YE..*....L.S..q&..=.u..X.....
                                                        Process:C:\Users\user\Desktop\I3LPkQh2an.exe
                                                        File Type:PE32+ executable (console) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1348608
                                                        Entropy (8bit):7.251569733727864
                                                        Encrypted:false
                                                        SSDEEP:24576:lQW4qoNUgslKNX0Ip0MgHCpoMBOu3Vg9N9JMlDlfjRiVuVsWt5MJMs:lQW9BKNX0IPgiKMBOulgFIDRRAubt5M
                                                        MD5:0FBD336D4561FB58CC24C965F9B57A79
                                                        SHA1:097A5B2F858069F72CB44858F3DEE7224533F5F5
                                                        SHA-256:9AE7D29186B8803CBE27D82B1AF7BF665C6C094A1F3AF3B6EA8429674CFAEA55
                                                        SHA-512:62DF82F381F3F664CAF70085BD0B546280277393384D1B8E7741E35BF2C34B5797A72E35FFE30EF3ABEE8E41F1E1B195F50E0CD0E42EDB6CDEADFA0C5B900BDE
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g..=#p.n#p.n#p.n*.kn%p.n7..o(p.n7..o p.n7..o.p.n#p.n.u.n7..o.p.n7..o.p.n7..n"p.n7..n"p.n7..o"p.nRich#p.n........................PE..d....4............"..........$.......K.........@....................................Z..... .......... .......................................j..h....`...a... ...:..................0a..T....................%..(....$...............%..P............................text...L........................... ..`.rdata..............................@..@.data....z.......n..................@....pdata...:... ...<..................@..@.rsrc....a...`...b...2..............@..@.reloc..............................@...................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\I3LPkQh2an.exe
                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1592832
                                                        Entropy (8bit):4.174831444481443
                                                        Encrypted:false
                                                        SSDEEP:24576:42G7AbHjk8Vg9N9JMlDlfjRiVuVsWt5MJMs:42G7AbHjrgFIDRRAubt5M
                                                        MD5:8532FFD22B9001E55EEF1B70229CE7D5
                                                        SHA1:2D6E8EBC51B55B0268C3C050362B7BD6AD64C581
                                                        SHA-256:E6FB501C5D447719F0C7A96AA748434CA5D63EA77C67247BE2006D620344777B
                                                        SHA-512:FBFC9FEBB955C3A4026A157B34E31B2FBBE442E54285A75997A13081DDD9DF644160A67E90129A3B6D26B5F8866AC438BED52A321288FC29D214A78BFAD9360F
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B6l0.W.c.W.c.W.c./.cPW.c.<.b.W.c.<.b.W.c.W.c.S.c.<.b.W.c.<.b.W.c.<.b.W.c.<.c.W.c.<.c.W.c.<.b.W.cRich.W.c................PE..d...^.Jw.........."............................@.....................................`.... .......... ......................................p?...................................... #..T...................8...(... ...............`...H............................text............................... ..`.rdata...b.......d..................@..@.data...@....p.......P..............@....pdata...............T..............@..@.rsrc................b..............@..@.reloc...............n..............@...........................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\I3LPkQh2an.exe
                                                        File Type:PE32+ executable (console) x86-64, for MS Windows
                                                        Category:modified
                                                        Size (bytes):1242624
                                                        Entropy (8bit):7.287676431576278
                                                        Encrypted:false
                                                        SSDEEP:24576:hkdpSI+K3S/GWei+qNv2wG3EVg9N9JMlDlfjRiVuVsWt5MJMs:h6SIGGWei2wG3EgFIDRRAubt5M
                                                        MD5:F5C3AF7F65A2D58E83F7ADEB452660F9
                                                        SHA1:B67E24DF91E7DF23FE162AD763238C39676530F9
                                                        SHA-256:9B1A9DBEED690507D9F4E4DABF66C3A1A3C981C65F49B09E3942963FFA6B9AB7
                                                        SHA-512:A3C0D39AA7320852C6E89CDEB85DFAD24EF6E173AA8E091C0CDB00D10EAD8E53C2A266010690CD7BA4E0CCE4CDBA420B02FC3631CC8224E6E8922225799593DF
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............}x..}x..}x...{..}x...|..}x...y..}x..}y.x|x...p..}x...}..}x......}x...z..}x.Rich.}x.................PE..d................."...... .....................@.............................P....... .... ..................................................{..h....P...........1......................T...........................pk...............l.......{..@....................text...Y........ .................. ..`.rdata..2u...0...v...$..............@..@.data... H.......<..................@....pdata...1.......2..................@..@.didat.......@......................@....rsrc........P......................@..@.reloc.......`......................@...................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\I3LPkQh2an.exe
                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1594368
                                                        Entropy (8bit):4.175684233123378
                                                        Encrypted:false
                                                        SSDEEP:12288:IEP3RFzV3VfCfHcqNS0zKepmlDlpVfjp8EizX+AuV27snt5odJMs:jF5Vg9N9JMlDlfjRiVuVsWt5MJMs
                                                        MD5:09DAC14A3F12ABA6BB239CCFA7799AD0
                                                        SHA1:0B6E0DA2FBB7ED6065FD5FE324746C4E853FC522
                                                        SHA-256:E89949F570D885BE36A88561BD57DF75BFB89EB869073101334C038B3BFE0764
                                                        SHA-512:7B560B78FD23297D8CCA26A5FE6CD20A1B39B2183FDDDBEA2BA5D06BABA27FE7A30CAE9E85F3ABCB00CB21679F78767417CB9E6CED423BC19EBF469E0274F363
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........,..dB.dB.dB....dB..A.dB..F.dB.dC.,dB..C.dB..G.dB..J.dB....dB..@.dB.Rich.dB.........PE..d...E.~..........."............................@....................................Gl.... .......... ......................................`E...............p.. ................... ...T...............................................8...TA.......................text............................... ..`.rdata..rV.......X..................@..@.data........`.......@..............@....pdata.. ....p.......D..............@..@.didat...............R..............@....rsrc............ ...T..............@..@.reloc...............t..............@...................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\AppVClient.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):12320
                                                        Entropy (8bit):7.984465246022505
                                                        Encrypted:false
                                                        SSDEEP:192:Rg7aDXLgyt+neIs+0Lscu2JfhUtAlr/ltlECxftvrtEoSvz+TltfF+z9QA9byQY+:OALgns+ORJfhUtAL48taoKKltfFmLAn+
                                                        MD5:C53A2F2AE41A04DFAB7EEB1F9842A248
                                                        SHA1:C28CFA0B83FDEE28FF4AA8550015515425292AC5
                                                        SHA-256:6358E8A373D8774D613DB07222168AE1BE6676D7F010EB5F7CEB7E7230F8CD09
                                                        SHA-512:1BFE089F049FABD8DED93A8515551565C47B79267FDB6F49AC8FFDE011872245C40D9A419C0EA03F5721A7C4A0124AF44558607A09F7D27A3B0542F3D83187C5
                                                        Malicious:false
                                                        Preview:3.f..;.R..4..).sL.....vIK...=V.R;9].....g.%.Mqc......4zX...~.....A..a;.~...y....."(.4..%.z..........+R...vQ...<UV.U..Dv.*.q..I.....w..DmE...^..b.....Q..t.e.....f.qw.#........:.\..0LW.S...J,...2...t.eu../fV/.M......*3.0.......V.u?.EF....R...=...u.v...).."&.......tL...O.F...c..=...p.!o.E.../.K.P......]TUm..Hb6.xo..~..#.....UV...}........w....A.pG.......k...c.P....%,(.G...Y=0..$>n._...@l..=-.\\D......E.isDW..m...\1....1i.]......aO.]E...m2....@....df2...^.kI.b.OV..K2I.L.q...@#T..:..k..E....dXZ.F.E._.6..)..V..[.0..j.....69*..f..L.k....}l.....g.....u..y...Z.I8*^mna....C.a.k...y....ivA...A.<..4...W..S...!.u....L..A..9.:i).......gG?...eA.)..;..?....:].g...~.......)._z#Y.....@.O.'.t.qk&.1.U.p..0Q...f..~.OK.+F.....RH..k#T.L[.......m..7g8..9......c....$........]:......J.E.c...a....M.....;b.."S.%s.'..\...;.[D.A......$.......\o.......T.$*....g+e'..}.|...6N....0p.C...G}v..Z*......S.a.X.Re..lk......Mo N9..x.{5.8.3GU8.#..se......1E.v..YN.+2<....2K.
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):7.518241343556186
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:I3LPkQh2an.exe
                                                        File size:1'793'024 bytes
                                                        MD5:b277e18dd8f1c8cc1908e58b16db405c
                                                        SHA1:b64ecf7d0cf0433d9c919acbf320b421de1a5cf3
                                                        SHA256:f9d78174d15fee469beb09ad3a07fb4a87333cd00477b8dc934568edcb959738
                                                        SHA512:545cc34ff5b14f996bc13a9a3f9a7e308cabc8919b604eac0ba290103ccac59cae54d0d2f9f8584091fc053777be9360e81927464cd8f881a2d5a16c435e94d6
                                                        SSDEEP:49152:k20c++OCvkGs9FaH8AmZ7D3QkaUDmrbtTZY4gFIDRRAubt5M:/B3vkJ95AcD3QJ4mrbtVcUf
                                                        TLSH:C585E02273DDC361CB679173FF2AB7016FBB38610630B95B2F940D79A950162162DBA3
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                        Icon Hash:aaf3e3e3938382a0
                                                        Entrypoint:0x427dcd
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x675A1BFA [Wed Dec 11 23:10:50 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                        Instruction
                                                        call 00007F1840FF9DEAh
                                                        jmp 00007F1840FECBB4h
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        push edi
                                                        push esi
                                                        mov esi, dword ptr [esp+10h]
                                                        mov ecx, dword ptr [esp+14h]
                                                        mov edi, dword ptr [esp+0Ch]
                                                        mov eax, ecx
                                                        mov edx, ecx
                                                        add eax, esi
                                                        cmp edi, esi
                                                        jbe 00007F1840FECD3Ah
                                                        cmp edi, eax
                                                        jc 00007F1840FED09Eh
                                                        bt dword ptr [004C31FCh], 01h
                                                        jnc 00007F1840FECD39h
                                                        rep movsb
                                                        jmp 00007F1840FED04Ch
                                                        cmp ecx, 00000080h
                                                        jc 00007F1840FECF04h
                                                        mov eax, edi
                                                        xor eax, esi
                                                        test eax, 0000000Fh
                                                        jne 00007F1840FECD40h
                                                        bt dword ptr [004BE324h], 01h
                                                        jc 00007F1840FED210h
                                                        bt dword ptr [004C31FCh], 00000000h
                                                        jnc 00007F1840FECEDDh
                                                        test edi, 00000003h
                                                        jne 00007F1840FECEEEh
                                                        test esi, 00000003h
                                                        jne 00007F1840FECECDh
                                                        bt edi, 02h
                                                        jnc 00007F1840FECD3Fh
                                                        mov eax, dword ptr [esi]
                                                        sub ecx, 04h
                                                        lea esi, dword ptr [esi+04h]
                                                        mov dword ptr [edi], eax
                                                        lea edi, dword ptr [edi+04h]
                                                        bt edi, 03h
                                                        jnc 00007F1840FECD43h
                                                        movq xmm1, qword ptr [esi]
                                                        sub ecx, 08h
                                                        lea esi, dword ptr [esi+08h]
                                                        movq qword ptr [edi], xmm1
                                                        lea edi, dword ptr [edi+08h]
                                                        test esi, 00000007h
                                                        je 00007F1840FECD95h
                                                        bt esi, 03h
                                                        jnc 00007F1840FECDE8h
                                                        Programming Language:
                                                        • [ASM] VS2013 build 21005
                                                        • [ C ] VS2013 build 21005
                                                        • [C++] VS2013 build 21005
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        • [ASM] VS2013 UPD4 build 31101
                                                        • [RES] VS2013 build 21005
                                                        • [LNK] VS2013 UPD4 build 31101
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x5f440.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x8dcc40x8de003090a3327bcf1f126c5c7f9e4891301cFalse0.5728679102422908data6.676131091367248IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xc70000x5f4400x5f600b1dc1d2831362683146d02bc6b86ba2dFalse0.9306320650393185data7.901484850401359IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x1270000x960000x95000e8fd5eaabcdff57d4ff458e7f7074b3dFalse0.975751428796141data7.938027429915368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                        RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                        RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                        RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                        RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                        RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                        RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                        RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                        RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                        RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xcf7b80x56705data1.0003276345631869
                                                        RT_GROUP_ICON0x125ec00x76dataEnglishGreat Britain0.6610169491525424
                                                        RT_GROUP_ICON0x125f380x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0x125f4c0x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0x125f600x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0x125f740xdcdataEnglishGreat Britain0.6181818181818182
                                                        RT_MANIFEST0x1260500x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                        WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                        USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                        USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                        GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                        COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                        SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                        OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2025-01-10T21:24:19.651050+01002850851ETPRO MALWARE Win32/Expiro.NDO CnC Activity1192.168.2.74975054.244.188.17780TCP
                                                        2025-01-10T21:24:19.811403+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz154.244.188.17780192.168.2.749751TCP
                                                        2025-01-10T21:24:19.811403+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst154.244.188.17780192.168.2.749751TCP
                                                        2025-01-10T21:24:23.207715+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz144.221.84.10580192.168.2.749775TCP
                                                        2025-01-10T21:24:23.207715+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst144.221.84.10580192.168.2.749775TCP
                                                        2025-01-10T21:24:23.316285+01002051648ET MALWARE DNS Query to Expiro Related Domain (przvgke .biz)1192.168.2.7609581.1.1.153UDP
                                                        2025-01-10T21:24:25.594354+01002051649ET MALWARE DNS Query to Expiro Related Domain (knjghuig .biz)1192.168.2.7652511.1.1.153UDP
                                                        2025-01-10T21:24:27.040825+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz118.141.10.10780192.168.2.749795TCP
                                                        2025-01-10T21:24:27.040825+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst118.141.10.10780192.168.2.749795TCP
                                                        2025-01-10T21:25:00.871608+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz147.129.31.21280192.168.2.749990TCP
                                                        2025-01-10T21:25:00.871608+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst147.129.31.21280192.168.2.749990TCP
                                                        2025-01-10T21:25:08.131113+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz134.246.200.16080192.168.2.749996TCP
                                                        2025-01-10T21:25:08.131113+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst134.246.200.16080192.168.2.749996TCP
                                                        2025-01-10T21:25:11.418124+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz113.251.16.15080192.168.2.749999TCP
                                                        2025-01-10T21:25:11.418124+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst113.251.16.15080192.168.2.749999TCP
                                                        2025-01-10T21:25:14.219487+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz135.164.78.20080192.168.2.750003TCP
                                                        2025-01-10T21:25:14.219487+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst135.164.78.20080192.168.2.750003TCP
                                                        2025-01-10T21:25:14.750567+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz13.94.10.3480192.168.2.750004TCP
                                                        2025-01-10T21:25:14.750567+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst13.94.10.3480192.168.2.750004TCP
                                                        2025-01-10T21:25:24.640330+01002850851ETPRO MALWARE Win32/Expiro.NDO CnC Activity1192.168.2.75001118.141.10.10780TCP
                                                        2025-01-10T21:25:29.432881+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz118.246.231.12080192.168.2.750016TCP
                                                        2025-01-10T21:25:29.432881+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst118.246.231.12080192.168.2.750016TCP
                                                        2025-01-10T21:25:30.041296+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz134.227.7.13880192.168.2.750017TCP
                                                        2025-01-10T21:25:30.041296+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst134.227.7.13880192.168.2.750017TCP
                                                        2025-01-10T21:26:03.847123+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz13.254.94.18580192.168.2.750029TCP
                                                        2025-01-10T21:26:03.847123+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst13.254.94.18580192.168.2.750029TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 10, 2025 21:24:16.730281115 CET4973380192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:16.735145092 CET804973354.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:16.735215902 CET4973380192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:16.744771004 CET4973380192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:16.744801998 CET4973380192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:16.749592066 CET804973354.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:16.749608040 CET804973354.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:17.442502022 CET804973354.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:17.442630053 CET804973354.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:17.442668915 CET4973380192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:17.443142891 CET4973380192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:17.447860956 CET804973354.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:17.467345953 CET4973980192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:17.472115040 CET804973918.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:17.472315073 CET4973980192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:17.472368002 CET4973980192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:17.472457886 CET4973980192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:17.477071047 CET804973918.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:17.477212906 CET804973918.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:18.856451035 CET804973918.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:18.856642962 CET804973918.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:18.857458115 CET4973980192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:18.891143084 CET4973980192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:18.895903111 CET804973918.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:19.062829971 CET4975080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:19.067625999 CET804975054.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:19.067940950 CET4975080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:19.067940950 CET4975080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:19.067941904 CET4975080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:19.072779894 CET804975054.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:19.072793961 CET804975054.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:19.097688913 CET4975180192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:19.102515936 CET804975154.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:19.102626085 CET4975180192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:19.103081942 CET4975180192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:19.103081942 CET4975180192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:19.107842922 CET804975154.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:19.107860088 CET804975154.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:19.651050091 CET4975080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:19.805375099 CET804975154.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:19.805444002 CET804975154.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:19.805491924 CET4975180192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:19.806603909 CET4975180192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:19.811403036 CET804975154.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:19.882067919 CET4975880192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:19.886868000 CET804975818.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:19.886934042 CET4975880192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:19.887893915 CET4975880192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:19.887907028 CET4975880192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:19.892685890 CET804975818.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:19.892698050 CET804975818.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:21.256805897 CET804975818.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:21.257131100 CET804975818.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:21.257226944 CET4975880192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:21.279119968 CET4975880192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:21.283968925 CET804975818.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:21.987792015 CET4977080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:21.992571115 CET804977054.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:21.992641926 CET4977080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:21.993343115 CET4977080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:21.993369102 CET4977080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:21.998155117 CET804977054.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:21.998164892 CET804977054.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:22.704122066 CET804977054.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:22.704233885 CET804977054.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:22.704336882 CET4977080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:22.704396009 CET4977080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:24:22.709141016 CET804977054.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:24:25.637249947 CET4979580192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:25.642229080 CET804979518.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:25.642580986 CET4979580192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:25.655034065 CET4979580192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:25.655034065 CET4979580192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:25.660044909 CET804979518.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:25.660587072 CET804979518.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:27.035659075 CET804979518.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:27.035756111 CET804979518.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:24:27.035852909 CET4979580192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:27.036014080 CET4979580192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:24:27.040824890 CET804979518.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:03.560333967 CET4999380192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:03.565116882 CET804999318.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:03.565208912 CET4999380192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:03.565354109 CET4999380192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:03.565392971 CET4999380192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:03.571417093 CET804999318.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:03.571439028 CET804999318.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:04.930838108 CET804999318.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:04.930999041 CET4999380192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:04.931051970 CET804999318.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:04.931111097 CET4999380192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:04.937169075 CET804999318.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:12.390558958 CET5000280192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:12.395385981 CET805000254.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:12.396097898 CET5000280192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:12.396210909 CET5000280192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:12.396225929 CET5000280192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:12.401006937 CET805000254.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:12.401020050 CET805000254.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:13.288357019 CET805000254.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:13.288388014 CET805000254.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:13.288435936 CET5000280192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:13.288516998 CET805000254.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:13.288551092 CET5000280192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:13.288558960 CET5000280192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:13.294986963 CET805000254.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:15.936392069 CET5000680192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:15.941302061 CET805000654.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:15.941390038 CET5000680192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:15.941524982 CET5000680192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:15.941550970 CET5000680192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:15.946362019 CET805000654.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:15.946377039 CET805000654.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:16.925327063 CET805000654.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:16.925340891 CET805000654.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:16.925405979 CET5000680192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:16.925420046 CET805000654.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:16.925457001 CET5000680192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:16.925529003 CET5000680192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:16.925623894 CET805000654.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:16.925916910 CET5000680192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:16.930334091 CET805000654.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:18.737596035 CET5000980192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:18.742400885 CET805000954.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:18.742543936 CET5000980192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:18.742618084 CET5000980192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:18.742618084 CET5000980192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:18.747425079 CET805000954.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:18.747436047 CET805000954.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:19.101281881 CET5000980192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:19.129626989 CET5001080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:19.134587049 CET805001054.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:19.134663105 CET5001080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:19.134802103 CET5001080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:19.134896040 CET5001080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:19.139575958 CET805001054.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:19.139707088 CET805001054.244.188.177192.168.2.7
                                                        Jan 10, 2025 21:25:23.080694914 CET5001080192.168.2.754.244.188.177
                                                        Jan 10, 2025 21:25:23.269047022 CET5001180192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:23.273907900 CET805001118.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:23.273991108 CET5001180192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:23.274118900 CET5001180192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:23.274151087 CET5001180192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:23.278960943 CET805001118.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:23.278984070 CET805001118.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:24.640212059 CET805001118.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:24.640235901 CET805001118.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:24.640330076 CET5001180192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:24.640436888 CET5001180192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:24.645227909 CET805001118.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:26.008182049 CET5001480192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:26.014206886 CET805001418.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:26.014281034 CET5001480192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:26.014388084 CET5001480192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:26.014431000 CET5001480192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:26.019151926 CET805001418.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:26.019270897 CET805001418.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:27.080180883 CET5001480192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:27.104444027 CET5001580192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:27.109276056 CET805001518.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:27.109339952 CET5001580192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:27.109468937 CET5001580192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:27.109496117 CET5001580192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:27.114286900 CET805001518.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:27.114296913 CET805001518.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:28.474107981 CET805001518.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:28.474183083 CET805001518.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:25:28.474240065 CET5001580192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:28.474282026 CET5001580192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:25:28.479077101 CET805001518.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:26:15.847759008 CET5003880192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:26:15.852650881 CET805003818.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:26:15.852745056 CET5003880192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:26:15.852916002 CET5003880192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:26:15.852916002 CET5003880192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:26:15.857769966 CET805003818.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:26:15.857784033 CET805003818.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:26:17.311055899 CET805003818.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:26:17.311177015 CET805003818.141.10.107192.168.2.7
                                                        Jan 10, 2025 21:26:17.311327934 CET5003880192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:26:17.311327934 CET5003880192.168.2.718.141.10.107
                                                        Jan 10, 2025 21:26:17.316081047 CET805003818.141.10.107192.168.2.7
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 10, 2025 21:24:09.637181997 CET5153353192.168.2.71.1.1.1
                                                        Jan 10, 2025 21:24:15.366774082 CET5766453192.168.2.71.1.1.1
                                                        Jan 10, 2025 21:24:15.374509096 CET53576641.1.1.1192.168.2.7
                                                        Jan 10, 2025 21:24:17.452384949 CET5464553192.168.2.71.1.1.1
                                                        Jan 10, 2025 21:24:17.459774971 CET53546451.1.1.1192.168.2.7
                                                        Jan 10, 2025 21:24:18.903846979 CET6164353192.168.2.71.1.1.1
                                                        Jan 10, 2025 21:24:18.911590099 CET53616431.1.1.1192.168.2.7
                                                        Jan 10, 2025 21:24:19.011162043 CET5152953192.168.2.71.1.1.1
                                                        Jan 10, 2025 21:24:19.018903017 CET53515291.1.1.1192.168.2.7
                                                        Jan 10, 2025 21:24:19.841234922 CET5226853192.168.2.71.1.1.1
                                                        Jan 10, 2025 21:24:19.848429918 CET53522681.1.1.1192.168.2.7
                                                        Jan 10, 2025 21:24:21.770448923 CET5239953192.168.2.71.1.1.1
                                                        Jan 10, 2025 21:24:21.960067034 CET53523991.1.1.1192.168.2.7
                                                        Jan 10, 2025 21:24:25.593529940 CET53596911.1.1.1192.168.2.7
                                                        Jan 10, 2025 21:24:27.089734077 CET53495011.1.1.1192.168.2.7
                                                        Jan 10, 2025 21:24:27.099297047 CET53533271.1.1.1192.168.2.7
                                                        Jan 10, 2025 21:25:28.504695892 CET53632761.1.1.1192.168.2.7
                                                        Jan 10, 2025 21:26:09.067379951 CET53626331.1.1.1192.168.2.7
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Jan 10, 2025 21:24:09.637181997 CET192.168.2.71.1.1.10xdd19Standard query (0)time.windows.comA (IP address)IN (0x0001)false
                                                        Jan 10, 2025 21:24:15.366774082 CET192.168.2.71.1.1.10x8b43Standard query (0)pywolwnvd.bizA (IP address)IN (0x0001)false
                                                        Jan 10, 2025 21:24:17.452384949 CET192.168.2.71.1.1.10x80a4Standard query (0)ssbzmoy.bizA (IP address)IN (0x0001)false
                                                        Jan 10, 2025 21:24:18.903846979 CET192.168.2.71.1.1.10x294aStandard query (0)cvgrf.bizA (IP address)IN (0x0001)false
                                                        Jan 10, 2025 21:24:19.011162043 CET192.168.2.71.1.1.10xc9ffStandard query (0)pywolwnvd.bizA (IP address)IN (0x0001)false
                                                        Jan 10, 2025 21:24:19.841234922 CET192.168.2.71.1.1.10x3a48Standard query (0)ssbzmoy.bizA (IP address)IN (0x0001)false
                                                        Jan 10, 2025 21:24:21.770448923 CET192.168.2.71.1.1.10xc507Standard query (0)cvgrf.bizA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Jan 10, 2025 21:24:09.643821001 CET1.1.1.1192.168.2.70xdd19No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                                        Jan 10, 2025 21:24:11.532665014 CET1.1.1.1192.168.2.70x2afaNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                        Jan 10, 2025 21:24:11.532665014 CET1.1.1.1192.168.2.70x2afaNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 21:24:15.374509096 CET1.1.1.1192.168.2.70x8b43No error (0)pywolwnvd.biz54.244.188.177A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 21:24:17.459774971 CET1.1.1.1192.168.2.70x80a4No error (0)ssbzmoy.biz18.141.10.107A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 21:24:18.911590099 CET1.1.1.1192.168.2.70x294aNo error (0)cvgrf.biz54.244.188.177A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 21:24:19.018903017 CET1.1.1.1192.168.2.70xc9ffNo error (0)pywolwnvd.biz54.244.188.177A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 21:24:19.848429918 CET1.1.1.1192.168.2.70x3a48No error (0)ssbzmoy.biz18.141.10.107A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 21:24:21.960067034 CET1.1.1.1192.168.2.70xc507No error (0)cvgrf.biz54.244.188.177A (IP address)IN (0x0001)false
                                                        Jan 10, 2025 21:24:25.593529940 CET1.1.1.1192.168.2.70x8Name error (3)zlenh.biznonenoneA (IP address)IN (0x0001)false
                                                        Jan 10, 2025 21:24:27.089734077 CET1.1.1.1192.168.2.70xda83Name error (3)uhxqin.biznonenoneA (IP address)IN (0x0001)false
                                                        Jan 10, 2025 21:24:27.099297047 CET1.1.1.1192.168.2.70xbf76Name error (3)anpmnmxo.biznonenoneA (IP address)IN (0x0001)false
                                                        • pywolwnvd.biz
                                                        • ssbzmoy.biz
                                                        • cvgrf.biz
                                                        • knjghuig.biz
                                                        • vcddkls.biz
                                                        • dwrqljrr.biz
                                                        • oshhkdluh.biz
                                                        • lrxdmhrr.biz
                                                        • wllvnzb.biz
                                                        • acwjcqqv.biz
                                                        • warkcdu.biz
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.74973354.244.188.177807632C:\Users\user\Desktop\I3LPkQh2an.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:24:16.744771004 CET346OUTPOST /w HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: pywolwnvd.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 810
                                                        Jan 10, 2025 21:24:16.744801998 CET810OUTData Raw: 6b 0d 30 de 01 c3 f1 3a 1e 03 00 00 e4 f5 ae c7 73 11 10 6e 66 38 12 f1 c6 0b bc c4 e7 66 8f 48 1a 99 7b e5 1a b3 e7 ba ff 9b c3 3e 7b 36 d9 35 9d fa 65 c9 27 98 73 af 15 ef 7c fa 46 fc f4 fe 7b 6e ca c6 27 67 4e 71 fd 46 ca a6 fd b4 b6 98 dc 1e
                                                        Data Ascii: k0:snf8fH{>{65e's|F{n'gNqFz:KAzf*"9zo>w'V{Y6.m7~4?_G<jU[G1<Rma(SdvhsuFj<2_Ku!zQ_Q(1Bu
                                                        Jan 10, 2025 21:24:17.442502022 CET413INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 20:24:17 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Set-Cookie: btst=378a99d2b4d7ebefd54d02335b4c08ec|8.46.123.189|1736540657|1736540657|0|1|0; path=/; domain=.pywolwnvd.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                        Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                        Data Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.74973918.141.10.107807632C:\Users\user\Desktop\I3LPkQh2an.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:24:17.472368002 CET346OUTPOST /cle HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: ssbzmoy.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 810
                                                        Jan 10, 2025 21:24:17.472457886 CET810OUTData Raw: 92 94 59 1b 57 0d da 15 1e 03 00 00 a6 43 5a 3d 31 20 c8 0c fc 6a 49 72 49 64 c9 84 00 d8 29 25 ef b8 4d f4 55 47 fb a2 20 91 7a ee b7 54 a8 7f c9 3d db e3 36 dc ab ae 25 ae 35 02 9b 7e 7f c1 c8 5e 80 9a 65 16 6d 6e a4 3c 98 8e 47 64 6a 4c 71 d1
                                                        Data Ascii: YWCZ=1 jIrId)%MUG zT=6%5~^emn<GdjLq^E)?ZeDS``+tKNy#I)^z_>32][@eS4%Rem,LRQ[Al,eq4z)_{%43.2v1|lI9i8:0i|q[!vb
                                                        Jan 10, 2025 21:24:18.856451035 CET411INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 20:24:18 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Set-Cookie: btst=fd0b3beade1256b85d2e825fab331a7e|8.46.123.189|1736540658|1736540658|0|1|0; path=/; domain=.ssbzmoy.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                        Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                        Data Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.74975054.244.188.177807632C:\Users\user\Desktop\I3LPkQh2an.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:24:19.067940950 CET354OUTPOST /wbjqiahuptwvb HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: cvgrf.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 810
                                                        Jan 10, 2025 21:24:19.067941904 CET810OUTData Raw: 7b 06 ac 93 44 33 d2 5d 1e 03 00 00 4d 26 cd f4 b2 f9 86 3c 80 27 ec d9 ac 42 59 00 d3 1c 16 ca 62 12 ac 83 49 e9 cd d7 de 43 89 89 8f 88 00 a6 fd 21 36 cb 7f 14 b8 eb 84 2a a9 32 b0 4f 81 30 2f 52 71 b9 47 71 85 c3 bc 79 4a b2 81 0b 71 fe f8 23
                                                        Data Ascii: {D3]M&<'BYbIC!6*2O0/RqGqyJq#w[Xfjsf|~(Za|1;,[K@Qmqyv.#7`ZTSs~(k>%-nfju/#o-KR`E9;nf<WK;D


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.74975154.244.188.17780
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:24:19.103081942 CET349OUTPOST /osbo HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: pywolwnvd.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 874
                                                        Jan 10, 2025 21:24:19.103081942 CET874OUTData Raw: 19 fe 75 cb 0d 2a 17 b4 5e 03 00 00 e4 45 04 0a ad 2a 20 b8 9d c2 52 1d 46 6e 3e 57 dd d2 b1 2b de 34 45 56 ad e3 c9 80 1c f8 c1 b1 03 f6 ce c7 67 f2 5a 6f 83 3b f3 9c ac c5 7e 89 59 c3 a3 dd 05 19 71 c6 fd 88 13 6b e6 fa b2 84 0a 64 16 e3 25 38
                                                        Data Ascii: u*^E* RFn>W+4EVgZo;~Yqkd%8l%c%FBWz13vPrb7hs4/22|^j5dR=7CdP)0n1\;0zfP@qQ532&9sTtCr@z7Y
                                                        Jan 10, 2025 21:24:19.805375099 CET413INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 20:24:19 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Set-Cookie: btst=b90ef1185b17f06b8a3821cedeb94012|8.46.123.189|1736540659|1736540659|0|1|0; path=/; domain=.pywolwnvd.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                        Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                        Data Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.74975818.141.10.10780
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:24:19.887893915 CET346OUTPOST /mxe HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: ssbzmoy.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 874
                                                        Jan 10, 2025 21:24:19.887907028 CET874OUTData Raw: 43 ce a5 a8 39 2d 07 46 5e 03 00 00 12 f0 04 20 b2 4f 13 b3 cc 02 56 0b 22 35 3c 58 b3 a1 00 3c 20 a5 51 92 82 6d b9 95 8d ad 45 6a c0 74 6d 73 c2 0a ca 72 5b d0 6d 02 af b5 53 8c ac 60 1e ae 4a a4 32 c4 d0 6b 04 26 a0 43 bc 06 ce 70 0e 2e f1 40
                                                        Data Ascii: C9-F^ OV"5<X< QmEjtmsr[mS`J2k&Cp.@`Ud:9;; $O%\nB1[9U]CxW#BVN}u>eIBP=5tr~z*=7:ST~\%5,*wn,AQNsirL:%"
                                                        Jan 10, 2025 21:24:21.256805897 CET411INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 20:24:20 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Set-Cookie: btst=7b6f15508d450007b0be47baa6ac02ac|8.46.123.189|1736540660|1736540660|0|1|0; path=/; domain=.ssbzmoy.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                        Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                        Data Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.74977054.244.188.17780
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:24:21.993343115 CET355OUTPOST /pajihutcfilntm HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: cvgrf.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 874
                                                        Jan 10, 2025 21:24:21.993369102 CET874OUTData Raw: c1 02 71 be 76 24 88 44 5e 03 00 00 e9 6a e1 92 ee 06 58 13 36 29 8d 13 9d 90 83 a9 f3 39 e5 cd a4 06 7b 76 94 4e e3 82 81 4b 10 7b 27 eb ad 6f 18 58 30 e6 b2 59 ca 5a 0e f0 b8 8d 53 f2 d8 01 53 34 f2 ad ce 92 30 2e 3c 08 9a b0 92 cf ca ed 83 60
                                                        Data Ascii: qv$D^jX6)9{vNK{'oX0YZSS40.<`J/M7IC@tHEJ+vwQUX=m=#m_NvR"Y6hxO#t3^GuMJ7UNMq7x.bL'Nz
                                                        Jan 10, 2025 21:24:22.704122066 CET409INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 20:24:22 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Set-Cookie: btst=68a9aa2f12d02490f7b7020ce7ca54eb|8.46.123.189|1736540662|1736540662|0|1|0; path=/; domain=.cvgrf.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                        Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                        Data Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.74979518.141.10.10780
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:24:25.655034065 CET355OUTPOST /voucowxceex HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: knjghuig.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 874
                                                        Jan 10, 2025 21:24:25.655034065 CET874OUTData Raw: b0 17 82 d0 ea 7b 5a 79 5e 03 00 00 58 15 51 60 e0 d0 ff c4 21 0e bb 6a c2 fc 78 cf 36 2b d7 c8 6d 06 3c d3 43 19 1d 91 15 6b 6a 3e b9 0b 10 47 a0 6f 90 0d 38 39 9d 73 c7 01 08 01 eb 35 7f db 98 40 d5 88 73 98 39 81 cf f1 87 89 8e d9 ba 12 83 c6
                                                        Data Ascii: {Zy^XQ`!jx6+m<Ckj>Go89s5@s9X6,xb~nM9R;:3ck/I<P"cc>88%=,RUP!;Jjzc{SentS]K69^(}:y}z'3#`7)_}'WC4Q
                                                        Jan 10, 2025 21:24:27.035659075 CET412INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 20:24:26 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Set-Cookie: btst=2e6438ad6a2d1d0eb5af1879c8138308|8.46.123.189|1736540666|1736540666|0|1|0; path=/; domain=.knjghuig.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                        Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                        Data Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.74999318.141.10.10780
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:25:03.565354109 CET350OUTPOST /ycqjghy HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: vcddkls.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 874
                                                        Jan 10, 2025 21:25:03.565392971 CET874OUTData Raw: 07 72 9e 00 9a 3a 00 ed 5e 03 00 00 c3 8e ca 90 50 07 f2 ed 15 6e 0e 96 fe 41 f3 38 95 54 7b 17 be 33 a1 bd a7 09 c6 88 40 9f 1a be 38 ae 69 92 52 b5 fb 67 42 c1 7b 8c b8 90 13 9d e1 a1 e7 cb 0d ed 4b 08 1b 6d d1 f4 71 f6 10 80 bd 37 96 90 52 d4
                                                        Data Ascii: r:^PnA8T{3@8iRgB{Kmq7R5Njz=bZQ,l?d3,8k!?$@\<t55G<4PM8&48b4!56!Bbh}3VM%SA%/Z*}h(-`p4[
                                                        Jan 10, 2025 21:25:04.930838108 CET411INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 20:25:04 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Set-Cookie: btst=1d1f53bf446fc57e6df042a8deba4079|8.46.123.189|1736540704|1736540704|0|1|0; path=/; domain=.vcddkls.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                        Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                        Data Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.75000254.244.188.17780
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:25:12.396210909 CET357OUTPOST /wfnlorhejqfnr HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: dwrqljrr.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 874
                                                        Jan 10, 2025 21:25:12.396225929 CET874OUTData Raw: 40 33 56 2e 50 99 9c 2a 5e 03 00 00 9e e0 fe f3 f4 e8 76 e2 f3 31 f2 b0 90 4f 4d 5c 7a 1a 85 2a f0 70 ca 16 1a 56 8b dd 41 14 f1 02 81 5d 4d e0 ea 75 5a 48 59 1a 48 15 f9 01 27 02 fe 50 86 4e 2b c6 0c d9 4d ec ca a8 ec 11 7e c2 26 c8 93 d0 7e 57
                                                        Data Ascii: @3V.P*^v1OM\z*pVA]MuZHYH'PN+M~&~W,w^F)%=2*AvDBOqd^x~fw%|(K|wziX&3$TXu-9}@_J!&_}Q3N!$3r?z=[?1
                                                        Jan 10, 2025 21:25:13.288357019 CET412INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 20:25:12 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Set-Cookie: btst=eb3790c521eb0990c764f1d3fc1b9ccc|8.46.123.189|1736540712|1736540712|0|1|0; path=/; domain=.dwrqljrr.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                        Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                        Data Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.75000654.244.188.17780
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:25:15.941524982 CET352OUTPOST /agqwjlv HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: oshhkdluh.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 874
                                                        Jan 10, 2025 21:25:15.941550970 CET874OUTData Raw: a6 0c b2 28 be 85 47 ae 5e 03 00 00 2a d0 95 ab f6 66 84 61 15 10 1a 29 bc 97 5c 69 ad 3a 7d 6a a0 81 60 f5 eb bc 2a a2 d8 db e6 32 90 d8 f4 86 e8 10 cc e9 7d bb d0 93 dc f5 77 cb 11 0d 39 55 56 30 fa ab b3 82 6d aa ec 8f 59 a9 72 03 04 dc ec a6
                                                        Data Ascii: (G^*fa)\i:}j`*2}w9UV0mYr?cv6\R!q4CSm}rda^8/c31[.KAxI28Xhr-qY|D?45+MB.U[NSD&R5/N6uBZ
                                                        Jan 10, 2025 21:25:16.925327063 CET413INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 20:25:16 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Set-Cookie: btst=59d486627410b6dff562dcc0e2309ead|8.46.123.189|1736540716|1736540716|0|1|0; path=/; domain=.oshhkdluh.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                        Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                        Data Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0
                                                        Jan 10, 2025 21:25:16.925623894 CET413INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 20:25:16 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Set-Cookie: btst=59d486627410b6dff562dcc0e2309ead|8.46.123.189|1736540716|1736540716|0|1|0; path=/; domain=.oshhkdluh.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                        Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                        Data Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.75000954.244.188.17780
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:25:18.742618084 CET360OUTPOST /ibckscxhsodddaet HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: lrxdmhrr.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 874
                                                        Jan 10, 2025 21:25:18.742618084 CET874OUTData Raw: 7f 6a 67 25 fc b1 98 c2 5e 03 00 00 72 e3 12 c6 9a 61 8e 49 34 f1 f7 4f cb 71 e3 0e 5f e3 d3 a3 49 40 2f 93 64 3e 8b 53 68 be 70 ba aa 9a 8c 90 93 4e 72 e2 48 ac 82 5b c6 45 cb 47 b1 70 cb dc 0a 5d 77 b2 71 eb dc 80 ce 6e da d2 af 27 46 d9 99 50
                                                        Data Ascii: jg%^raI4Oq_I@/d>ShpNrH[EGp]wqn'FPr+.*M`hSNcUA.\rL)w"Q&r!U-xH/QP~\q,cXyb0b tFKPUN:>m+)F;S


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.75001054.244.188.17780
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:25:19.134802103 CET353OUTPOST /rwlfutjcp HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: lrxdmhrr.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 874
                                                        Jan 10, 2025 21:25:19.134896040 CET874OUTData Raw: f8 1e 39 ed b1 f8 e0 a3 5e 03 00 00 4c 1c 80 de b7 75 80 7b dd 3d 60 8b c1 a1 3d 22 e1 f7 78 a7 3d af 55 98 c9 14 61 14 3a 20 a9 6d b5 99 3b 62 0f 09 17 73 69 4a 5c 08 3c 6e 24 df ef 77 1b f7 9a 95 18 71 7a f8 7b 21 05 2c f2 ff a0 88 2a 50 26 30
                                                        Data Ascii: 9^Lu{=`="x=Ua: m;bsiJ\<n$wqz{!,*P&0x'BdZ*r1/C-Cpo\&&3i(0(LU{V9LZnc{#6{\@.mDJ)TYiG@m4'ntkS/TO)EA\


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.75001118.141.10.10780
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:25:23.274118900 CET349OUTPOST /shvehx HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: wllvnzb.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 874
                                                        Jan 10, 2025 21:25:23.274151087 CET874OUTData Raw: 2a 09 97 9d ea 97 c6 c6 5e 03 00 00 c9 9c cd 20 81 23 f4 48 3e 26 5c 34 7e 9b 20 cd 8a d1 3b 78 1d 24 95 70 99 f9 a7 31 0d ef 20 cf d2 fe ab 70 05 8a 1a 16 af 0c ec cd 63 55 29 7a 4d cd fe 9a cd 37 f4 5d 95 71 04 79 45 06 e9 0e fe c2 fc 30 38 ab
                                                        Data Ascii: *^ #H>&\4~ ;x$p1 pcU)zM7]qyE08=vAezGiW(1-w3&p^,|Bsgb+1VC$:u9>7' y0{IQ'nfX3JITM&y5r[z$/n&WZx;G"
                                                        Jan 10, 2025 21:25:24.640212059 CET411INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 20:25:24 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Set-Cookie: btst=f8a119ecfbd483c6426decc3f6ef619a|8.46.123.189|1736540724|1736540724|0|1|0; path=/; domain=.wllvnzb.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                        Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                        Data Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.75001418.141.10.10780
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:25:26.014388084 CET347OUTPOST /tfd HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: acwjcqqv.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 874
                                                        Jan 10, 2025 21:25:26.014431000 CET874OUTData Raw: d2 41 d1 fc 97 61 68 94 5e 03 00 00 4a a9 9d ff 03 ca 48 73 8f 81 61 3c 21 47 44 c0 89 59 68 b0 fd 97 c8 da 56 5c 7b 58 18 ab b1 27 f9 66 22 ad 1c 97 6e dc e5 ba 68 a0 0b cb 95 e6 15 b8 2a c7 21 26 ee ac be 5f 05 12 93 16 d3 c4 0a 70 c7 1a 3f 45
                                                        Data Ascii: Aah^JHsa<!GDYhV\{X'f"nh*!&_p?EQT=`sp^)<ws4-6W77 vZhkg4E`3fB()<jz-x_IUp@4?U_?nD#~yj48FM)lH||VmR5b


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        14192.168.2.75001518.141.10.10780
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:25:27.109468937 CET347OUTPOST /hch HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: acwjcqqv.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 874
                                                        Jan 10, 2025 21:25:27.109496117 CET874OUTData Raw: 12 4d 9a ec b7 be 66 68 5e 03 00 00 86 86 81 44 7b a6 e2 81 15 e4 7b 06 8b 8c f4 b2 97 20 73 5e 2c 12 bc 64 bd 38 58 05 93 8f 2d d7 1e 73 60 0e 25 07 c0 92 fc 92 73 b5 6a d3 e3 75 37 78 62 56 76 37 fc b2 18 9e c9 33 8b 21 ea d1 2c ee 27 9e f9 5f
                                                        Data Ascii: Mfh^D{{ s^,d8X-s`%sju7xbVv73!,'_bc^jkkIQ[QG"/8v>+ZCX*E(/w\~RzK,ArD!T80R$L^I*d&f'cslNee/i-
                                                        Jan 10, 2025 21:25:28.474107981 CET412INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 20:25:28 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Set-Cookie: btst=0bf6068be65e3263b227e15ed9882cfb|8.46.123.189|1736540728|1736540728|0|1|0; path=/; domain=.acwjcqqv.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                        Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                        Data Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        15192.168.2.75003818.141.10.10780
                                                        TimestampBytes transferredDirectionData
                                                        Jan 10, 2025 21:26:15.852916002 CET357OUTPOST /gloumaahxxajxf HTTP/1.1
                                                        Cache-Control: no-cache
                                                        Connection: Keep-Alive
                                                        Pragma: no-cache
                                                        Host: warkcdu.biz
                                                        User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                        Content-Length: 874
                                                        Jan 10, 2025 21:26:15.852916002 CET874OUTData Raw: 4d f9 29 6b e4 ad e1 0a 5e 03 00 00 23 ca 6e 99 f8 a4 2e ba 32 98 45 1c f4 f0 4e d8 90 09 7e 4f db 66 56 c4 b8 05 8f 58 0a 8e e2 31 6d e9 73 5c db 36 9b 0c f8 b9 9d 7a 91 be 0f 0b 0d 2d 9a 1c c1 2f 66 39 35 26 2b 2b 8e e8 4e 25 8a 67 9e 4d e6 58
                                                        Data Ascii: M)k^#n.2EN~OfVX1ms\6z-/f95&++N%gMX.!*y%CpN!M1bRZi]`Qc>Q*EDg*{qC~0p`V@#N$"=~>l(UMWiUk
                                                        Jan 10, 2025 21:26:17.311055899 CET411INHTTP/1.1 200 OK
                                                        Server: nginx
                                                        Date: Fri, 10 Jan 2025 20:26:17 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Set-Cookie: btst=c62d82c6e857e5156a5ec5ce5881472e|8.46.123.189|1736540777|1736540777|0|1|0; path=/; domain=.warkcdu.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                        Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                        Data Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:15:24:13
                                                        Start date:10/01/2025
                                                        Path:C:\Users\user\Desktop\I3LPkQh2an.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\I3LPkQh2an.exe"
                                                        Imagebase:0x400000
                                                        File size:1'793'024 bytes
                                                        MD5 hash:B277E18DD8F1C8CC1908E58B16DB405C
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:15:24:13
                                                        Start date:10/01/2025
                                                        Path:C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe"
                                                        Imagebase:0x400000
                                                        File size:1'658'880 bytes
                                                        MD5 hash:FD31927032749FC47370737BE446DF49
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 100%, Avira
                                                        • Detection: 100%, Joe Sandbox ML
                                                        Reputation:low
                                                        Has exited:false

                                                        Target ID:3
                                                        Start time:15:24:14
                                                        Start date:10/01/2025
                                                        Path:C:\Windows\System32\alg.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\System32\alg.exe
                                                        Imagebase:0x140000000
                                                        File size:1'594'368 bytes
                                                        MD5 hash:09DAC14A3F12ABA6BB239CCFA7799AD0
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 100%, Avira
                                                        • Detection: 100%, Joe Sandbox ML
                                                        Reputation:low
                                                        Has exited:false

                                                        Target ID:4
                                                        Start time:15:24:15
                                                        Start date:10/01/2025
                                                        Path:C:\Windows\System32\drivers\AppVStrm.sys
                                                        Wow64 process (32bit):
                                                        Commandline:
                                                        Imagebase:
                                                        File size:138'056 bytes
                                                        MD5 hash:BDA55F89B69757320BC125FF1CB53B26
                                                        Has elevated privileges:
                                                        Has administrator privileges:
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Target ID:5
                                                        Start time:15:24:15
                                                        Start date:10/01/2025
                                                        Path:C:\Windows\System32\drivers\AppvVemgr.sys
                                                        Wow64 process (32bit):
                                                        Commandline:
                                                        Imagebase:
                                                        File size:174'408 bytes
                                                        MD5 hash:E70EE9B57F8D771E2F4D6E6B535F6757
                                                        Has elevated privileges:
                                                        Has administrator privileges:
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Target ID:6
                                                        Start time:15:24:15
                                                        Start date:10/01/2025
                                                        Path:C:\Windows\System32\drivers\AppvVfs.sys
                                                        Wow64 process (32bit):
                                                        Commandline:
                                                        Imagebase:
                                                        File size:154'952 bytes
                                                        MD5 hash:2CBABD729D5E746B6BD8DC1B4B4DB1E1
                                                        Has elevated privileges:
                                                        Has administrator privileges:
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Target ID:7
                                                        Start time:15:24:15
                                                        Start date:10/01/2025
                                                        Path:C:\Windows\System32\AppVClient.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\AppVClient.exe
                                                        Imagebase:0x140000000
                                                        File size:1'348'608 bytes
                                                        MD5 hash:0FBD336D4561FB58CC24C965F9B57A79
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 100%, Avira
                                                        • Detection: 100%, Joe Sandbox ML
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:9
                                                        Start time:15:24:16
                                                        Start date:10/01/2025
                                                        Path:C:\Windows\SysWOW64\svchost.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\I3LPkQh2an.exe"
                                                        Imagebase:0x6b0000
                                                        File size:46'504 bytes
                                                        MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000009.00000002.1738864587.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000009.00000002.1740236285.0000000003690000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:10
                                                        Start time:15:24:19
                                                        Start date:10/01/2025
                                                        Path:C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe"
                                                        Imagebase:0x140000000
                                                        File size:2'354'176 bytes
                                                        MD5 hash:A19ADA9B1BCFFDFE7612B776B7EB43DA
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:false

                                                        Target ID:11
                                                        Start time:15:24:21
                                                        Start date:10/01/2025
                                                        Path:C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                                                        Imagebase:0x140000000
                                                        File size:1'725'440 bytes
                                                        MD5 hash:299377D30369966F4E6BFFFE968F16D3
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:3.7%
                                                          Dynamic/Decrypted Code Coverage:6.8%
                                                          Signature Coverage:7.3%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:82
                                                          execution_graph 109068 ad520c 109071 afcbd0 109068->109071 109070 ad5211 109089 afbe50 _wcslen 109071->109089 109072 afc168 109110 afa905 LocalFree 109072->109110 109075 afc78e CloseServiceHandle 109075->109089 109076 afbffd StrStrIW 109076->109089 109077 afc706 StrStrIW 109077->109089 109079 afbf68 StrStrIW 109079->109089 109080 afc72b StrStrIW 109080->109089 109081 afc399 StrStrIW 109086 afc3a9 109081->109086 109081->109089 109082 afbf7e 109085 afc7e4 StartServiceW 109082->109085 109087 afc36b OpenServiceW 109082->109087 109084 afc0fd CloseServiceHandle 109084->109089 109085->109089 109086->109070 109087->109089 109088 afc65a ChangeServiceConfigW 109088->109089 109090 afbfe9 109088->109090 109089->109070 109089->109071 109089->109072 109089->109075 109089->109076 109089->109077 109089->109079 109089->109080 109089->109081 109089->109082 109089->109084 109089->109085 109089->109088 109089->109090 109091 adce90 109089->109091 109109 afa350 CloseServiceHandle 109089->109109 109111 ad5d20 109089->109111 109090->109070 109099 adcc9b _wcslen 109091->109099 109092 add426 109095 add8a1 CloseHandle 109092->109095 109096 add42a CloseHandle 109092->109096 109093 add5c5 CreateFileW 109093->109099 109094 add729 GetFileSizeEx 109094->109095 109094->109099 109095->109099 109096->109099 109097 adcd5c lstrcmpiW 109097->109099 109099->109089 109099->109091 109099->109092 109099->109093 109099->109094 109099->109095 109099->109096 109099->109097 109100 adcca0 lstrcmpiW 109099->109100 109102 add049 SetFilePointerEx 109099->109102 109103 add378 CloseHandle 109099->109103 109104 ad5d20 VirtualAlloc VirtualFree 109099->109104 109106 adcfbb GetFileTime 109099->109106 109107 add903 109099->109107 109108 adcc92 109099->109108 109116 ad8937 VirtualAlloc VirtualFree 109099->109116 109117 ad8470 VirtualAlloc VirtualFree 109099->109117 109100->109099 109102->109099 109103->109099 109104->109099 109105 b0fdfc 40 API calls 109105->109107 109106->109099 109107->109105 109107->109108 109108->109089 109109->109089 109110->109090 109113 ad5d22 109111->109113 109112 ad5d39 VirtualAlloc 109112->109113 109113->109089 109113->109112 109115 ad5d46 VirtualFree 109113->109115 109115->109089 109116->109099 109117->109099 109118 43fe27 109131 41f944 109118->109131 109120 43fe3d 109121 43fe53 109120->109121 109122 43febe 109120->109122 109220 409e5d 60 API calls 109121->109220 109140 40fce0 109122->109140 109124 43fe92 109126 44089c 109124->109126 109127 43fe9a 109124->109127 109222 469e4a 89 API calls 4 library calls 109126->109222 109221 46834f 59 API calls Mailbox 109127->109221 109130 43feb2 Mailbox 109132 41f950 109131->109132 109133 41f962 109131->109133 109223 409d3c 109132->109223 109135 41f991 109133->109135 109136 41f968 109133->109136 109138 409d3c 60 API calls 109135->109138 109236 420db6 109136->109236 109139 41f95a 109138->109139 109139->109120 109281 408180 109140->109281 109142 40fd3d 109143 44472d 109142->109143 109203 4106f6 109142->109203 109286 40f234 109142->109286 109417 469e4a 89 API calls 4 library calls 109143->109417 109147 40fdd3 109148 410545 _memmove 109147->109148 109149 40fe3e 109147->109149 109151 410517 109147->109151 109152 444742 109147->109152 109156 420db6 59 API calls Mailbox 109147->109156 109165 444755 109147->109165 109194 44480c 109147->109194 109387 409ea0 109147->109387 109175 420db6 Mailbox 59 API calls 109148->109175 109150 44488d 109149->109150 109161 40fe4c 109149->109161 109421 4566ec 59 API calls 2 library calls 109149->109421 109150->109152 109150->109161 109423 47a2d9 85 API calls Mailbox 109150->109423 109159 420db6 Mailbox 59 API calls 109151->109159 109153 4447d7 109153->109152 109419 469e4a 89 API calls 4 library calls 109153->109419 109156->109147 109159->109148 109160 444848 109422 4560ef 59 API calls 2 library calls 109160->109422 109162 4448f9 109161->109162 109207 444b53 109161->109207 109290 40837c 109161->109290 109169 444917 109162->109169 109425 4085c0 109162->109425 109165->109153 109418 40f6a3 341 API calls 109165->109418 109167 4448b2 Mailbox 109167->109161 109424 4566ec 59 API calls 2 library calls 109167->109424 109174 444928 109169->109174 109177 4085c0 59 API calls 109169->109177 109170 40fea4 109178 444ad6 109170->109178 109179 40ff32 109170->109179 109214 410179 Mailbox _memmove 109170->109214 109171 44486b 109172 409ea0 341 API calls 109171->109172 109172->109150 109174->109214 109433 4560ab 59 API calls Mailbox 109174->109433 109218 410106 _memmove 109175->109218 109177->109174 109441 469ae7 60 API calls 109178->109441 109181 420db6 Mailbox 59 API calls 109179->109181 109183 40ff39 109181->109183 109183->109203 109297 4109d0 109183->109297 109185 444a4d 109186 409ea0 341 API calls 109185->109186 109188 444a87 109186->109188 109188->109152 109436 4084c0 109188->109436 109190 40ffb2 109190->109148 109197 40ffe6 109190->109197 109190->109203 109420 469e4a 89 API calls 4 library calls 109194->109420 109196 444ab2 109440 469e4a 89 API calls 4 library calls 109196->109440 109202 408047 59 API calls 109197->109202 109205 410007 109197->109205 109198 420db6 59 API calls Mailbox 109198->109214 109201 409d3c 60 API calls 109201->109214 109202->109205 109416 469e4a 89 API calls 4 library calls 109203->109416 109204 410398 109204->109130 109205->109203 109206 444b24 109205->109206 109211 41004c 109205->109211 109208 409d3c 60 API calls 109206->109208 109207->109152 109442 469e4a 89 API calls 4 library calls 109207->109442 109208->109207 109209 4100d8 109210 409d3c 60 API calls 109209->109210 109213 4100eb 109210->109213 109211->109203 109211->109207 109211->109209 109212 444a1c 109215 420db6 Mailbox 59 API calls 109212->109215 109213->109203 109374 4082df 109213->109374 109214->109185 109214->109196 109214->109198 109214->109201 109214->109203 109214->109204 109214->109212 109385 408740 68 API calls __cinit 109214->109385 109386 408660 68 API calls 109214->109386 109434 465937 68 API calls 109214->109434 109435 4089b3 69 API calls Mailbox 109214->109435 109215->109185 109218->109214 109219 410162 109218->109219 109411 409c90 109218->109411 109219->109130 109220->109124 109221->109130 109222->109130 109224 409d4a 109223->109224 109234 409d78 Mailbox 109223->109234 109225 409d9d 109224->109225 109230 409d50 Mailbox 109224->109230 109246 408047 109225->109246 109227 409d64 109228 409dcc 109227->109228 109229 409d6f 109227->109229 109227->109234 109228->109234 109250 408cd4 59 API calls Mailbox 109228->109250 109231 43f9e6 VariantClear 109229->109231 109229->109234 109230->109227 109233 43fa0f 109230->109233 109231->109234 109233->109234 109251 456e8f 59 API calls 109233->109251 109234->109139 109239 420dbe 109236->109239 109238 420dd8 109238->109139 109239->109238 109241 420ddc std::exception::exception 109239->109241 109253 42571c 109239->109253 109270 4233a1 DecodePointer 109239->109270 109271 42859b RaiseException 109241->109271 109243 420e06 109272 4284d1 58 API calls _free 109243->109272 109245 420e18 109245->109139 109247 408052 109246->109247 109248 40805a 109246->109248 109252 407f77 59 API calls 2 library calls 109247->109252 109248->109234 109250->109234 109251->109234 109252->109248 109254 425797 109253->109254 109262 425728 109253->109262 109279 4233a1 DecodePointer 109254->109279 109256 42579d 109280 428b28 58 API calls __getptd_noexit 109256->109280 109259 42575b RtlAllocateHeap 109259->109262 109269 42578f 109259->109269 109261 425783 109277 428b28 58 API calls __getptd_noexit 109261->109277 109262->109259 109262->109261 109266 425781 109262->109266 109267 425733 109262->109267 109276 4233a1 DecodePointer 109262->109276 109278 428b28 58 API calls __getptd_noexit 109266->109278 109267->109262 109273 42a16b 58 API calls __NMSG_WRITE 109267->109273 109274 42a1c8 58 API calls 5 library calls 109267->109274 109275 42309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 109267->109275 109269->109239 109270->109239 109271->109243 109272->109245 109273->109267 109274->109267 109276->109262 109277->109266 109278->109269 109279->109256 109280->109269 109282 40818f 109281->109282 109285 4081aa 109281->109285 109443 407e4f 109282->109443 109284 408197 CharUpperBuffW 109284->109285 109285->109142 109287 40f251 109286->109287 109288 40f272 109287->109288 109447 469e4a 89 API calls 4 library calls 109287->109447 109288->109147 109291 40838d 109290->109291 109292 43edbd 109290->109292 109293 420db6 Mailbox 59 API calls 109291->109293 109294 408394 109293->109294 109295 4083b5 109294->109295 109448 408634 59 API calls Mailbox 109294->109448 109295->109162 109295->109170 109298 444cc3 109297->109298 109310 4109f5 109297->109310 109515 469e4a 89 API calls 4 library calls 109298->109515 109300 410ce4 109301 410cfa 109300->109301 109512 411070 10 API calls Mailbox 109300->109512 109301->109190 109303 410ee4 109303->109301 109305 410ef1 109303->109305 109513 411093 341 API calls Mailbox 109305->109513 109306 410a4b PeekMessageW 109326 410a05 Mailbox 109306->109326 109308 410ef8 LockWindowUpdate DestroyWindow GetMessageW 109308->109301 109312 410f2a 109308->109312 109310->109326 109516 409e5d 60 API calls 109310->109516 109517 456349 341 API calls 109310->109517 109311 444e81 Sleep 109311->109326 109314 445c58 TranslateMessage DispatchMessageW GetMessageW 109312->109314 109314->109314 109315 445c88 109314->109315 109315->109301 109316 410e43 PeekMessageW 109316->109326 109317 410ea5 TranslateMessage DispatchMessageW 109317->109316 109318 444d50 TranslateAcceleratorW 109318->109316 109318->109326 109319 410d13 timeGetTime 109319->109326 109320 44581f WaitForSingleObject 109324 44583c GetExitCodeProcess CloseHandle 109320->109324 109320->109326 109322 408047 59 API calls 109322->109326 109334 410f95 109324->109334 109325 410e5f Sleep 109330 410e70 Mailbox 109325->109330 109326->109300 109326->109306 109326->109311 109326->109316 109326->109317 109326->109318 109326->109319 109326->109320 109326->109322 109326->109325 109327 420db6 59 API calls Mailbox 109326->109327 109328 445af8 Sleep 109326->109328 109326->109330 109333 410f4e timeGetTime 109326->109333 109326->109334 109345 40b73c 314 API calls 109326->109345 109347 409e5d 60 API calls 109326->109347 109357 40fce0 314 API calls 109326->109357 109360 4084c0 69 API calls 109326->109360 109362 407de1 59 API calls 109326->109362 109363 469e4a 89 API calls 109326->109363 109364 409c90 59 API calls Mailbox 109326->109364 109365 409ea0 314 API calls 109326->109365 109366 4082df 59 API calls 109326->109366 109367 45617e 59 API calls Mailbox 109326->109367 109368 4089b3 69 API calls 109326->109368 109369 4455d5 VariantClear 109326->109369 109370 44566b VariantClear 109326->109370 109371 445419 VariantClear 109326->109371 109372 408cd4 59 API calls Mailbox 109326->109372 109373 456e8f 59 API calls 109326->109373 109449 40e420 109326->109449 109456 40e6a0 109326->109456 109487 40f460 109326->109487 109507 4031ce 109326->109507 109518 486018 59 API calls 109326->109518 109519 469a15 59 API calls Mailbox 109326->109519 109520 45d4f2 59 API calls 109326->109520 109521 409837 109326->109521 109539 4560ef 59 API calls 2 library calls 109326->109539 109540 408401 59 API calls 109326->109540 109327->109326 109328->109330 109330->109326 109332 42049f timeGetTime 109330->109332 109330->109334 109337 445b8f GetExitCodeProcess 109330->109337 109340 485f25 110 API calls 109330->109340 109341 40b7dd 109 API calls 109330->109341 109346 445874 109330->109346 109348 445078 Sleep 109330->109348 109349 445c17 Sleep 109330->109349 109541 407667 109330->109541 109546 462408 60 API calls 109330->109546 109547 409e5d 60 API calls 109330->109547 109548 407de1 109330->109548 109552 4089b3 69 API calls Mailbox 109330->109552 109553 40b73c 341 API calls 109330->109553 109554 4564da 60 API calls 109330->109554 109555 465244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 109330->109555 109556 463c55 66 API calls Mailbox 109330->109556 109332->109330 109514 409e5d 60 API calls 109333->109514 109334->109190 109342 445ba5 WaitForSingleObject 109337->109342 109343 445bbb CloseHandle 109337->109343 109340->109330 109341->109330 109342->109326 109342->109343 109343->109330 109345->109326 109346->109334 109347->109326 109348->109326 109349->109326 109357->109326 109360->109326 109362->109326 109363->109326 109364->109326 109365->109326 109366->109326 109367->109326 109368->109326 109369->109326 109370->109326 109371->109326 109372->109326 109373->109326 109376 43eda1 109374->109376 109378 4082f2 109374->109378 109375 43edb1 109376->109375 110786 4561a4 59 API calls 109376->110786 109379 40831c 109378->109379 109380 4085c0 59 API calls 109378->109380 109384 408339 Mailbox 109378->109384 109381 408322 109379->109381 109382 4085c0 59 API calls 109379->109382 109380->109379 109383 409c90 Mailbox 59 API calls 109381->109383 109381->109384 109382->109381 109383->109384 109384->109218 109385->109214 109386->109214 109388 409ebf 109387->109388 109405 409eed Mailbox 109387->109405 109390 420db6 Mailbox 59 API calls 109388->109390 109389 422d40 67 API calls __cinit 109389->109405 109390->109405 109391 40b475 109392 408047 59 API calls 109391->109392 109406 40a057 109392->109406 109393 420db6 59 API calls Mailbox 109393->109405 109394 40b47a 109395 440055 109394->109395 109409 4409e5 109394->109409 110804 469e4a 89 API calls 4 library calls 109395->110804 109399 408047 59 API calls 109399->109405 109400 440064 109400->109147 109403 407667 59 API calls 109403->109405 109404 456e8f 59 API calls 109404->109405 109405->109389 109405->109391 109405->109393 109405->109394 109405->109395 109405->109399 109405->109403 109405->109404 109405->109406 109407 4409d6 109405->109407 109410 40a55a 109405->109410 110787 40b900 109405->110787 110803 40c8c0 341 API calls 2 library calls 109405->110803 109406->109147 110806 469e4a 89 API calls 4 library calls 109407->110806 110807 469e4a 89 API calls 4 library calls 109409->110807 110805 469e4a 89 API calls 4 library calls 109410->110805 109413 409c9b 109411->109413 109412 409cd2 109412->109218 109413->109412 110813 408cd4 59 API calls Mailbox 109413->110813 109415 409cfd 109415->109218 109416->109143 109417->109152 109418->109153 109419->109152 109420->109152 109421->109160 109422->109171 109423->109167 109424->109167 109426 4085ce 109425->109426 109432 4085f6 109425->109432 109427 4085dc 109426->109427 109428 4085c0 59 API calls 109426->109428 109429 4085e2 109427->109429 109430 4085c0 59 API calls 109427->109430 109428->109427 109431 409c90 Mailbox 59 API calls 109429->109431 109429->109432 109430->109429 109431->109432 109432->109169 109433->109214 109434->109214 109435->109214 109437 4084cb 109436->109437 109439 4084f2 109437->109439 110814 4089b3 69 API calls Mailbox 109437->110814 109439->109196 109440->109152 109441->109197 109442->109152 109444 407e62 109443->109444 109446 407e5f _memmove 109443->109446 109445 420db6 Mailbox 59 API calls 109444->109445 109445->109446 109446->109284 109447->109288 109448->109295 109450 40e43d 109449->109450 109452 40e451 109449->109452 109557 40df00 341 API calls 2 library calls 109450->109557 109558 469e4a 89 API calls 4 library calls 109452->109558 109454 40e448 109454->109326 109455 443aa4 109455->109455 109457 40e6d5 109456->109457 109458 443aa9 109457->109458 109461 40e73f 109457->109461 109470 40e799 109457->109470 109459 409ea0 341 API calls 109458->109459 109460 443abe 109459->109460 109474 40e970 Mailbox 109460->109474 109560 469e4a 89 API calls 4 library calls 109460->109560 109464 407667 59 API calls 109461->109464 109461->109470 109462 407667 59 API calls 109462->109470 109465 443b04 109464->109465 109561 422d40 109465->109561 109466 422d40 __cinit 67 API calls 109466->109470 109468 443b26 109468->109326 109469 4084c0 69 API calls 109469->109474 109470->109462 109470->109466 109470->109468 109471 40e95a 109470->109471 109470->109474 109471->109474 109564 469e4a 89 API calls 4 library calls 109471->109564 109472 409ea0 341 API calls 109472->109474 109474->109469 109474->109472 109475 409c90 Mailbox 59 API calls 109474->109475 109476 469e4a 89 API calls 109474->109476 109478 40f195 109474->109478 109482 408d40 59 API calls 109474->109482 109486 40ea78 109474->109486 109559 407f77 59 API calls 2 library calls 109474->109559 109565 456e8f 59 API calls 109474->109565 109566 47c5c3 341 API calls 109474->109566 109567 47b53c 341 API calls Mailbox 109474->109567 109569 4793c6 341 API calls Mailbox 109474->109569 109475->109474 109476->109474 109568 469e4a 89 API calls 4 library calls 109478->109568 109482->109474 109485 443e25 109485->109326 109486->109326 109488 40f650 109487->109488 109489 40f4ba 109487->109489 109492 407de1 59 API calls 109488->109492 109490 40f4c6 109489->109490 109491 44441e 109489->109491 109749 40f290 341 API calls 2 library calls 109490->109749 109750 47bc6b 109491->109750 109498 40f58c Mailbox 109492->109498 109495 44442c 109499 40f630 109495->109499 109790 469e4a 89 API calls 4 library calls 109495->109790 109497 40f4fd 109497->109495 109497->109498 109497->109499 109648 46cb7a 109498->109648 109728 404e4a 109498->109728 109734 463c37 109498->109734 109737 47df37 109498->109737 109740 47445a 109498->109740 109499->109326 109500 409c90 Mailbox 59 API calls 109501 40f5e3 109500->109501 109501->109499 109501->109500 109508 403212 109507->109508 109511 4031e0 109507->109511 109508->109326 109509 403205 IsDialogMessageW 109509->109508 109509->109511 109510 43cf32 GetClassLongW 109510->109509 109510->109511 109511->109508 109511->109509 109511->109510 109512->109303 109513->109308 109514->109326 109515->109310 109516->109310 109517->109310 109518->109326 109519->109326 109520->109326 109522 409851 109521->109522 109523 40984b 109521->109523 109524 43f5d3 __i64tow 109522->109524 109525 409899 109522->109525 109527 409857 __itow 109522->109527 109530 43f4da 109522->109530 109523->109326 110784 423698 83 API calls 4 library calls 109525->110784 109529 420db6 Mailbox 59 API calls 109527->109529 109531 409871 109529->109531 109533 420db6 Mailbox 59 API calls 109530->109533 109534 43f552 Mailbox _wcscpy 109530->109534 109531->109523 109532 407de1 59 API calls 109531->109532 109532->109523 109535 43f51f 109533->109535 110785 423698 83 API calls 4 library calls 109534->110785 109536 420db6 Mailbox 59 API calls 109535->109536 109537 43f545 109536->109537 109537->109534 109538 407de1 59 API calls 109537->109538 109538->109534 109539->109326 109540->109326 109542 420db6 Mailbox 59 API calls 109541->109542 109543 407688 109542->109543 109544 420db6 Mailbox 59 API calls 109543->109544 109545 407696 109544->109545 109545->109330 109546->109330 109547->109330 109549 407df0 __NMSG_WRITE _memmove 109548->109549 109550 420db6 Mailbox 59 API calls 109549->109550 109551 407e2e 109550->109551 109551->109330 109552->109330 109553->109330 109554->109330 109555->109330 109556->109330 109557->109454 109558->109455 109559->109474 109560->109474 109570 422c44 109561->109570 109563 422d4b 109563->109470 109564->109474 109565->109474 109566->109474 109567->109474 109568->109485 109569->109474 109571 422c50 __fcloseall 109570->109571 109578 423217 109571->109578 109577 422c77 __fcloseall 109577->109563 109595 429c0b 109578->109595 109580 422c59 109581 422c88 DecodePointer DecodePointer 109580->109581 109582 422c65 109581->109582 109583 422cb5 109581->109583 109592 422c82 109582->109592 109583->109582 109641 4287a4 59 API calls 2 library calls 109583->109641 109585 422cc7 109586 422d18 EncodePointer EncodePointer 109585->109586 109587 422cec 109585->109587 109642 428864 61 API calls 2 library calls 109585->109642 109586->109582 109587->109582 109590 422d06 EncodePointer 109587->109590 109643 428864 61 API calls 2 library calls 109587->109643 109590->109586 109591 422d00 109591->109582 109591->109590 109644 423220 109592->109644 109596 429c2f EnterCriticalSection 109595->109596 109597 429c1c 109595->109597 109596->109580 109602 429c93 109597->109602 109599 429c22 109599->109596 109626 4230b5 58 API calls 3 library calls 109599->109626 109603 429c9f __fcloseall 109602->109603 109604 429ca8 109603->109604 109605 429cc0 109603->109605 109627 42a16b 58 API calls __NMSG_WRITE 109604->109627 109614 429ce1 __fcloseall 109605->109614 109630 42881d 58 API calls 2 library calls 109605->109630 109607 429cad 109628 42a1c8 58 API calls 5 library calls 109607->109628 109610 429cd5 109612 429ceb 109610->109612 109613 429cdc 109610->109613 109611 429cb4 109629 42309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 109611->109629 109617 429c0b __lock 58 API calls 109612->109617 109631 428b28 58 API calls __getptd_noexit 109613->109631 109614->109599 109619 429cf2 109617->109619 109620 429d17 109619->109620 109621 429cff 109619->109621 109633 422d55 109620->109633 109632 429e2b InitializeCriticalSectionAndSpinCount 109621->109632 109624 429d0b 109639 429d33 LeaveCriticalSection _doexit 109624->109639 109627->109607 109628->109611 109630->109610 109631->109614 109632->109624 109634 422d87 __dosmaperr 109633->109634 109635 422d5e RtlFreeHeap 109633->109635 109634->109624 109635->109634 109636 422d73 109635->109636 109640 428b28 58 API calls __getptd_noexit 109636->109640 109638 422d79 GetLastError 109638->109634 109639->109614 109640->109638 109641->109585 109642->109587 109643->109591 109647 429d75 LeaveCriticalSection 109644->109647 109646 422c87 109646->109577 109647->109646 109649 407667 59 API calls 109648->109649 109650 46cbaf 109649->109650 109651 407667 59 API calls 109650->109651 109652 46cbb8 109651->109652 109653 46cbcc 109652->109653 109987 409b3c 109652->109987 109655 409837 84 API calls 109653->109655 109656 46cbe9 109655->109656 109657 46ccea 109656->109657 109658 46cc0b 109656->109658 109670 46cd1a Mailbox 109656->109670 109791 404ddd 109657->109791 109659 409837 84 API calls 109658->109659 109661 46cc17 109659->109661 109663 408047 59 API calls 109661->109663 109665 46cc23 109663->109665 109664 46cd16 109667 407667 59 API calls 109664->109667 109664->109670 109672 46cc37 109665->109672 109673 46cc69 109665->109673 109666 404ddd 136 API calls 109666->109664 109668 46cd4b 109667->109668 109669 407667 59 API calls 109668->109669 109671 46cd54 109669->109671 109670->109501 109675 407667 59 API calls 109671->109675 109676 408047 59 API calls 109672->109676 109674 409837 84 API calls 109673->109674 109677 46cc76 109674->109677 109678 46cd5d 109675->109678 109679 46cc47 109676->109679 109680 408047 59 API calls 109677->109680 109681 407667 59 API calls 109678->109681 109991 407cab 109679->109991 109683 46cc82 109680->109683 109684 46cd66 109681->109684 109998 464a31 GetFileAttributesW 109683->109998 109687 409837 84 API calls 109684->109687 109690 46cd73 109687->109690 109688 409837 84 API calls 109691 46cc5d 109688->109691 109689 46cc8b 109692 46cc9e 109689->109692 109695 4079f2 59 API calls 109689->109695 109815 40459b 109690->109815 109694 407b2e 59 API calls 109691->109694 109697 409837 84 API calls 109692->109697 109702 46cca4 109692->109702 109694->109673 109695->109692 109696 46cd8e 109866 4079f2 109696->109866 109699 46cccb 109697->109699 109999 4637ef 75 API calls Mailbox 109699->109999 109702->109670 109703 46cdd1 109704 408047 59 API calls 109703->109704 109706 46cddf 109704->109706 109705 4079f2 59 API calls 109707 46cdae 109705->109707 109869 407b2e 109706->109869 109707->109703 110000 407bcc 109707->110000 109711 46cdc3 109713 407bcc 59 API calls 109711->109713 109712 407b2e 59 API calls 109714 46cdfb 109712->109714 109713->109703 109715 407b2e 59 API calls 109714->109715 109716 46ce09 109715->109716 109717 409837 84 API calls 109716->109717 109718 46ce15 109717->109718 109878 464071 109718->109878 109720 46ce26 109721 463c37 3 API calls 109720->109721 109722 46ce30 109721->109722 109723 409837 84 API calls 109722->109723 109727 46ce61 109722->109727 109724 46ce4e 109723->109724 109932 469155 109724->109932 109726 404e4a 84 API calls 109726->109670 109727->109726 109729 404e54 109728->109729 109730 404e5b 109728->109730 109731 4253a6 __fcloseall 83 API calls 109729->109731 109732 404e6a 109730->109732 109733 404e7b FreeLibrary 109730->109733 109731->109730 109732->109501 109733->109732 110624 46445a GetFileAttributesW 109734->110624 110628 47cadd 109737->110628 109739 47df47 109739->109501 109741 409837 84 API calls 109740->109741 109742 474494 109741->109742 110737 406240 109742->110737 109744 4744a4 109745 4744c9 109744->109745 109746 409ea0 341 API calls 109744->109746 109748 4744cd 109745->109748 110762 409a98 59 API calls Mailbox 109745->110762 109746->109745 109748->109501 109749->109497 109751 47bc96 109750->109751 109752 47bcb0 109750->109752 110776 469e4a 89 API calls 4 library calls 109751->110776 110777 47a213 59 API calls Mailbox 109752->110777 109755 47bcbb 109756 409ea0 340 API calls 109755->109756 109757 47bd1c 109756->109757 109758 47bca8 Mailbox 109757->109758 109759 47bdae 109757->109759 109763 47bd5d 109757->109763 109758->109495 109760 47be04 109759->109760 109761 47bdb4 109759->109761 109760->109758 109762 409837 84 API calls 109760->109762 110779 46791a 59 API calls 109761->110779 109764 47be16 109762->109764 110778 4672df 59 API calls Mailbox 109763->110778 109766 407e4f 59 API calls 109764->109766 109769 47be3a CharUpperBuffW 109766->109769 109767 47bdd7 110780 405d41 59 API calls Mailbox 109767->110780 109774 47be54 109769->109774 109771 47bd8d 109772 40f460 340 API calls 109771->109772 109772->109758 109773 47bddf Mailbox 109778 40fce0 340 API calls 109773->109778 109775 47bea7 109774->109775 109776 47be5b 109774->109776 109777 409837 84 API calls 109775->109777 110781 4672df 59 API calls Mailbox 109776->110781 109779 47beaf 109777->109779 109778->109758 110782 409e5d 60 API calls 109779->110782 109782 47be89 109783 40f460 340 API calls 109782->109783 109783->109758 109784 47beb9 109784->109758 109785 409837 84 API calls 109784->109785 109786 47bed4 109785->109786 110783 405d41 59 API calls Mailbox 109786->110783 109788 47bee4 109789 40fce0 340 API calls 109788->109789 109789->109758 109790->109499 110009 404bb5 109791->110009 109796 43d8e6 109799 404e4a 84 API calls 109796->109799 109797 404e08 LoadLibraryExW 110019 404b6a 109797->110019 109801 43d8ed 109799->109801 109803 404b6a 3 API calls 109801->109803 109805 43d8f5 109803->109805 109804 404e2f 109804->109805 109806 404e3b 109804->109806 110045 404f0b 109805->110045 109807 404e4a 84 API calls 109806->109807 109810 404e40 109807->109810 109810->109664 109810->109666 109812 43d91c 110053 404ec7 109812->110053 109816 407667 59 API calls 109815->109816 109817 4045b1 109816->109817 109818 407667 59 API calls 109817->109818 109819 4045b9 109818->109819 109820 407667 59 API calls 109819->109820 109821 4045c1 109820->109821 109822 407667 59 API calls 109821->109822 109823 4045c9 109822->109823 109824 43d4d2 109823->109824 109825 4045fd 109823->109825 109826 408047 59 API calls 109824->109826 109827 40784b 59 API calls 109825->109827 109828 43d4db 109826->109828 109829 40460b 109827->109829 110245 407d8c 109828->110245 110241 407d2c 109829->110241 109832 404615 109833 404640 109832->109833 109834 40784b 59 API calls 109832->109834 109835 404680 109833->109835 109837 40465f 109833->109837 109848 43d4fb 109833->109848 109838 404636 109834->109838 110228 40784b 109835->110228 109842 4079f2 59 API calls 109837->109842 109841 407d2c 59 API calls 109838->109841 109839 404691 109843 4046a3 109839->109843 109846 408047 59 API calls 109839->109846 109840 43d5cb 109844 407bcc 59 API calls 109840->109844 109841->109833 109845 404669 109842->109845 109847 4046b3 109843->109847 109850 408047 59 API calls 109843->109850 109861 43d588 109844->109861 109845->109835 109849 40784b 59 API calls 109845->109849 109846->109843 109852 4046ba 109847->109852 109853 408047 59 API calls 109847->109853 109848->109840 109851 43d5b4 109848->109851 109860 43d532 109848->109860 109849->109835 109850->109847 109851->109840 109856 43d59f 109851->109856 109854 408047 59 API calls 109852->109854 109863 4046c1 Mailbox 109852->109863 109853->109852 109854->109863 109855 4079f2 59 API calls 109855->109861 109858 407bcc 59 API calls 109856->109858 109857 43d590 109859 407bcc 59 API calls 109857->109859 109858->109861 109859->109861 109860->109857 109864 43d57b 109860->109864 109861->109835 109861->109855 110249 407924 59 API calls 2 library calls 109861->110249 109863->109696 109865 407bcc 59 API calls 109864->109865 109865->109861 109867 407e4f 59 API calls 109866->109867 109868 4079fd 109867->109868 109868->109703 109868->109705 109870 407b40 109869->109870 109871 43ec6b 109869->109871 110257 407a51 109870->110257 110263 457bdb 59 API calls _memmove 109871->110263 109874 407b4c 109874->109712 109875 43ec75 109876 408047 59 API calls 109875->109876 109877 43ec7d Mailbox 109876->109877 109879 46408d 109878->109879 109880 464092 109879->109880 109881 4640a0 109879->109881 109882 408047 59 API calls 109880->109882 109883 407667 59 API calls 109881->109883 109884 46409b Mailbox 109882->109884 109885 4640a8 109883->109885 109884->109720 109886 407667 59 API calls 109885->109886 109887 4640b0 109886->109887 109888 407667 59 API calls 109887->109888 109889 4640bb 109888->109889 109890 407667 59 API calls 109889->109890 109891 4640c3 109890->109891 109892 407667 59 API calls 109891->109892 109893 4640cb 109892->109893 109894 407667 59 API calls 109893->109894 109895 4640d3 109894->109895 109896 407667 59 API calls 109895->109896 109897 4640db 109896->109897 109898 407667 59 API calls 109897->109898 109899 4640e3 109898->109899 109900 40459b 59 API calls 109899->109900 109901 4640fa 109900->109901 109902 40459b 59 API calls 109901->109902 109903 464113 109902->109903 109904 4079f2 59 API calls 109903->109904 109905 46411f 109904->109905 109906 464132 109905->109906 109907 407d2c 59 API calls 109905->109907 109908 4079f2 59 API calls 109906->109908 109907->109906 109909 46413b 109908->109909 109910 46414b 109909->109910 109911 407d2c 59 API calls 109909->109911 109912 408047 59 API calls 109910->109912 109911->109910 109913 464157 109912->109913 109914 407b2e 59 API calls 109913->109914 109933 469162 __ftell_nolock 109932->109933 109934 420db6 Mailbox 59 API calls 109933->109934 109935 4691bf 109934->109935 109936 40522e 59 API calls 109935->109936 109937 4691c9 109936->109937 109938 468f5f GetSystemTimeAsFileTime 109937->109938 109939 4691d4 109938->109939 109940 404ee5 85 API calls 109939->109940 109941 4691e7 _wcscmp 109940->109941 109942 46920b 109941->109942 109943 4692b8 109941->109943 110296 469734 109942->110296 109945 469734 96 API calls 109943->109945 109960 469284 _wcscat 109945->109960 109948 404f0b 74 API calls 109950 4692dd 109948->109950 109949 4692c1 109949->109727 109951 404f0b 74 API calls 109950->109951 109953 4692ed 109951->109953 109952 469239 _wcscat _wcscpy 110303 4240fb 58 API calls __wsplitpath_helper 109952->110303 109954 404f0b 74 API calls 109953->109954 109956 469308 109954->109956 109957 404f0b 74 API calls 109956->109957 109958 469318 109957->109958 109959 404f0b 74 API calls 109958->109959 109960->109948 109960->109949 109988 409b52 109987->109988 109989 409b4d 109987->109989 109988->109653 109989->109988 110618 42358a 59 API calls 109989->110618 109992 43ed4a 109991->109992 109993 407cbf 109991->109993 109995 408029 59 API calls 109992->109995 110619 407c50 109993->110619 109997 43ed55 __NMSG_WRITE _memmove 109995->109997 109996 407cca 109996->109688 109998->109689 109999->109702 110001 407c45 110000->110001 110002 407bd8 __NMSG_WRITE 110000->110002 110003 407d2c 59 API calls 110001->110003 110004 407c13 110002->110004 110005 407bee 110002->110005 110008 407bf6 _memmove 110003->110008 110007 408029 59 API calls 110004->110007 110006 407f27 59 API calls 110005->110006 110006->110008 110007->110008 110008->109711 110058 404c03 110009->110058 110012 404bdc 110014 404bf5 110012->110014 110015 404bec FreeLibrary 110012->110015 110013 404c03 2 API calls 110013->110012 110016 42525b 110014->110016 110015->110014 110062 425270 110016->110062 110018 404dfc 110018->109796 110018->109797 110143 404c36 110019->110143 110022 404c36 2 API calls 110025 404b8f 110022->110025 110023 404ba1 FreeLibrary 110024 404baa 110023->110024 110026 404c70 110024->110026 110025->110023 110025->110024 110027 420db6 Mailbox 59 API calls 110026->110027 110028 404c85 110027->110028 110147 40522e 110028->110147 110030 404c91 _memmove 110031 404ccc 110030->110031 110033 404dc1 110030->110033 110034 404d89 110030->110034 110032 404ec7 69 API calls 110031->110032 110038 404cd5 110032->110038 110161 46991b 95 API calls 110033->110161 110150 404e89 CreateStreamOnHGlobal 110034->110150 110037 404f0b 74 API calls 110037->110038 110038->110037 110040 404d69 110038->110040 110041 43d8a7 110038->110041 110156 404ee5 110038->110156 110040->109804 110042 404ee5 85 API calls 110041->110042 110043 43d8bb 110042->110043 110044 404f0b 74 API calls 110043->110044 110044->110040 110046 404f1d 110045->110046 110047 43d9cd 110045->110047 110185 4255e2 110046->110185 110050 469109 110205 468f5f 110050->110205 110052 46911f 110052->109812 110054 43d990 110053->110054 110055 404ed6 110053->110055 110210 425c60 110055->110210 110057 404ede 110059 404bd0 110058->110059 110060 404c0c LoadLibraryA 110058->110060 110059->110012 110059->110013 110060->110059 110061 404c1d GetProcAddress 110060->110061 110061->110059 110065 42527c __fcloseall 110062->110065 110063 42528f 110111 428b28 58 API calls __getptd_noexit 110063->110111 110065->110063 110067 4252c0 110065->110067 110066 425294 110112 428db6 9 API calls __snwprintf 110066->110112 110081 4304e8 110067->110081 110070 4252c5 110071 4252db 110070->110071 110072 4252ce 110070->110072 110074 425305 110071->110074 110075 4252e5 110071->110075 110113 428b28 58 API calls __getptd_noexit 110072->110113 110096 430607 110074->110096 110114 428b28 58 API calls __getptd_noexit 110075->110114 110078 42529f __fcloseall @_EH4_CallFilterFunc@8 110078->110018 110082 4304f4 __fcloseall 110081->110082 110083 429c0b __lock 58 API calls 110082->110083 110094 430502 110083->110094 110084 430576 110116 4305fe 110084->110116 110085 43057d 110121 42881d 58 API calls 2 library calls 110085->110121 110088 4305f3 __fcloseall 110088->110070 110089 430584 110089->110084 110122 429e2b InitializeCriticalSectionAndSpinCount 110089->110122 110091 429c93 __mtinitlocknum 58 API calls 110091->110094 110093 4305aa EnterCriticalSection 110093->110084 110094->110084 110094->110085 110094->110091 110119 426c50 59 API calls __lock 110094->110119 110120 426cba LeaveCriticalSection LeaveCriticalSection _doexit 110094->110120 110097 430627 __wopenfile 110096->110097 110098 430641 110097->110098 110110 4307fc 110097->110110 110129 4237cb 60 API calls 3 library calls 110097->110129 110127 428b28 58 API calls __getptd_noexit 110098->110127 110100 430646 110128 428db6 9 API calls __snwprintf 110100->110128 110102 43085f 110124 4385a1 110102->110124 110103 425310 110115 425332 LeaveCriticalSection LeaveCriticalSection _fprintf 110103->110115 110106 4307f5 110106->110110 110130 4237cb 60 API calls 3 library calls 110106->110130 110108 430814 110108->110110 110131 4237cb 60 API calls 3 library calls 110108->110131 110110->110098 110110->110102 110111->110066 110112->110078 110113->110078 110114->110078 110115->110078 110123 429d75 LeaveCriticalSection 110116->110123 110118 430605 110118->110088 110119->110094 110120->110094 110121->110089 110122->110093 110123->110118 110132 437d85 110124->110132 110126 4385ba 110126->110103 110127->110100 110128->110103 110129->110106 110130->110108 110131->110110 110133 437d91 __fcloseall 110132->110133 110134 437da7 110133->110134 110137 437ddd 110133->110137 110135 428b28 __dosmaperr 58 API calls 110134->110135 110136 437dac 110135->110136 110138 428db6 __snwprintf 9 API calls 110136->110138 110139 437e4e __wsopen_nolock 109 API calls 110137->110139 110142 437db6 __fcloseall 110138->110142 110140 437df9 110139->110140 110141 437e22 __wsopen_helper LeaveCriticalSection 110140->110141 110141->110142 110142->110126 110144 404b83 110143->110144 110145 404c3f LoadLibraryA 110143->110145 110144->110022 110144->110025 110145->110144 110146 404c50 GetProcAddress 110145->110146 110146->110144 110148 420db6 Mailbox 59 API calls 110147->110148 110149 405240 110148->110149 110149->110030 110151 404ea3 FindResourceExW 110150->110151 110153 404ec0 110150->110153 110152 43d933 LoadResource 110151->110152 110151->110153 110152->110153 110154 43d948 SizeofResource 110152->110154 110153->110031 110154->110153 110155 43d95c LockResource 110154->110155 110155->110153 110157 404ef4 110156->110157 110158 43d9ab 110156->110158 110162 42584d 110157->110162 110160 404f02 110160->110038 110161->110031 110166 425859 __fcloseall 110162->110166 110163 42586b 110175 428b28 58 API calls __getptd_noexit 110163->110175 110165 425891 110177 426c11 110165->110177 110166->110163 110166->110165 110167 425870 110176 428db6 9 API calls __snwprintf 110167->110176 110172 4258a6 110184 4258c8 LeaveCriticalSection LeaveCriticalSection _fprintf 110172->110184 110174 42587b __fcloseall 110174->110160 110175->110167 110176->110174 110178 426c43 EnterCriticalSection 110177->110178 110179 426c21 110177->110179 110182 425897 110178->110182 110179->110178 110180 426c29 110179->110180 110181 429c0b __lock 58 API calls 110180->110181 110181->110182 110183 4257be 83 API calls 5 library calls 110182->110183 110183->110172 110184->110174 110188 4255fd 110185->110188 110187 404f2e 110187->110050 110189 425609 __fcloseall 110188->110189 110190 42561f _memset 110189->110190 110191 42564c 110189->110191 110193 425644 __fcloseall 110189->110193 110201 428b28 58 API calls __getptd_noexit 110190->110201 110192 426c11 __lock_file 59 API calls 110191->110192 110194 425652 110192->110194 110193->110187 110203 42541d 72 API calls 7 library calls 110194->110203 110197 425639 110202 428db6 9 API calls __snwprintf 110197->110202 110198 425668 110204 425686 LeaveCriticalSection LeaveCriticalSection _fprintf 110198->110204 110201->110197 110202->110193 110203->110198 110204->110193 110208 42520a GetSystemTimeAsFileTime 110205->110208 110207 468f6e 110207->110052 110209 425238 __aulldiv 110208->110209 110209->110207 110211 425c6c __fcloseall 110210->110211 110212 425c93 110211->110212 110213 425c7e 110211->110213 110214 426c11 __lock_file 59 API calls 110212->110214 110224 428b28 58 API calls __getptd_noexit 110213->110224 110216 425c99 110214->110216 110226 4258d0 67 API calls 7 library calls 110216->110226 110217 425c83 110225 428db6 9 API calls __snwprintf 110217->110225 110220 425ca4 110227 425cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 110220->110227 110222 425cb6 110223 425c8e __fcloseall 110222->110223 110223->110057 110224->110217 110225->110223 110226->110220 110227->110222 110229 4078b7 110228->110229 110230 40785a 110228->110230 110231 407d2c 59 API calls 110229->110231 110230->110229 110232 407865 110230->110232 110233 407888 _memmove 110231->110233 110234 407880 110232->110234 110235 43eb09 110232->110235 110233->109839 110250 407f27 110234->110250 110254 408029 110235->110254 110238 43eb13 110239 420db6 Mailbox 59 API calls 110238->110239 110240 43eb33 110239->110240 110242 407d3a 110241->110242 110244 407d43 _memmove 110241->110244 110243 407e4f 59 API calls 110242->110243 110242->110244 110243->110244 110244->109832 110246 407da6 110245->110246 110248 407d99 110245->110248 110247 420db6 Mailbox 59 API calls 110246->110247 110247->110248 110248->109833 110249->109861 110251 407f3f 110250->110251 110253 407f39 110250->110253 110252 420db6 Mailbox 59 API calls 110251->110252 110252->110253 110253->110233 110255 420db6 Mailbox 59 API calls 110254->110255 110256 408033 110255->110256 110256->110238 110258 407a5f 110257->110258 110262 407a85 _memmove 110257->110262 110259 420db6 Mailbox 59 API calls 110258->110259 110258->110262 110260 407ad4 110259->110260 110261 420db6 Mailbox 59 API calls 110260->110261 110261->110262 110262->109874 110263->109875 110299 469748 __tzset_nolock _wcscmp 110296->110299 110297 469109 GetSystemTimeAsFileTime 110297->110299 110298 469210 110298->109949 110302 4240fb 58 API calls __wsplitpath_helper 110298->110302 110299->110297 110299->110298 110300 404f0b 74 API calls 110299->110300 110301 404ee5 85 API calls 110299->110301 110300->110299 110301->110299 110302->109952 110303->109960 110618->109988 110620 407c5f __NMSG_WRITE 110619->110620 110621 408029 59 API calls 110620->110621 110622 407c70 _memmove 110620->110622 110623 43ed07 _memmove 110621->110623 110622->109996 110625 463c3e 110624->110625 110626 464475 FindFirstFileW 110624->110626 110625->109501 110626->110625 110627 46448a FindClose 110626->110627 110627->110625 110629 409837 84 API calls 110628->110629 110630 47cb1a 110629->110630 110631 47cb61 Mailbox 110630->110631 110666 47d7a5 110630->110666 110631->109739 110633 47cf2e 110715 47d8c8 92 API calls Mailbox 110633->110715 110636 47cf3d 110638 47cdc7 110636->110638 110639 47cf49 110636->110639 110637 409837 84 API calls 110654 47cbb2 Mailbox 110637->110654 110679 47c96e 110638->110679 110639->110631 110644 47ce00 110694 420c08 110644->110694 110647 47ce33 110701 4092ce 110647->110701 110648 47ce1a 110700 469e4a 89 API calls 4 library calls 110648->110700 110651 47ce25 GetCurrentProcess TerminateProcess 110651->110647 110652 47cdb9 110652->110633 110652->110638 110654->110631 110654->110637 110654->110652 110698 47fbce 59 API calls 2 library calls 110654->110698 110699 47cfdf 61 API calls 2 library calls 110654->110699 110657 47cfa4 110657->110631 110662 47cfb8 FreeLibrary 110657->110662 110659 47ce6b 110713 47d649 107 API calls _free 110659->110713 110662->110631 110664 409d3c 60 API calls 110665 47ce7c 110664->110665 110665->110657 110665->110664 110714 408d40 59 API calls Mailbox 110665->110714 110716 47d649 107 API calls _free 110665->110716 110667 407e4f 59 API calls 110666->110667 110668 47d7c0 CharLowerBuffW 110667->110668 110717 45f167 110668->110717 110672 407667 59 API calls 110673 47d7f9 110672->110673 110674 40784b 59 API calls 110673->110674 110675 47d810 110674->110675 110676 407d2c 59 API calls 110675->110676 110677 47d81c Mailbox 110676->110677 110678 47d858 Mailbox 110677->110678 110724 47cfdf 61 API calls 2 library calls 110677->110724 110678->110654 110680 47c9de 110679->110680 110681 47c989 110679->110681 110685 47da50 110680->110685 110682 420db6 Mailbox 59 API calls 110681->110682 110684 47c9ab 110682->110684 110683 420db6 Mailbox 59 API calls 110683->110684 110684->110680 110684->110683 110686 47dc79 Mailbox 110685->110686 110691 47da73 _strcat _wcscpy __NMSG_WRITE 110685->110691 110686->110644 110687 409b98 59 API calls 110687->110691 110688 409be6 59 API calls 110688->110691 110689 409b3c 59 API calls 110689->110691 110690 42571c 58 API calls __malloc_crt 110690->110691 110691->110686 110691->110687 110691->110688 110691->110689 110691->110690 110692 409837 84 API calls 110691->110692 110727 465887 61 API calls 2 library calls 110691->110727 110692->110691 110695 420c1d 110694->110695 110696 420cb5 VirtualProtect 110695->110696 110697 420c83 110695->110697 110696->110697 110697->110647 110697->110648 110698->110654 110699->110654 110700->110651 110702 4092d6 110701->110702 110703 420db6 Mailbox 59 API calls 110702->110703 110704 4092e4 110703->110704 110705 4092f0 110704->110705 110728 4091fc 59 API calls Mailbox 110704->110728 110707 409050 110705->110707 110729 409160 110707->110729 110709 420db6 Mailbox 59 API calls 110710 4090fb 110709->110710 110710->110665 110712 408d40 59 API calls Mailbox 110710->110712 110711 40905f 110711->110709 110711->110710 110712->110659 110713->110665 110714->110665 110715->110636 110716->110665 110719 45f192 __NMSG_WRITE 110717->110719 110718 45f1d1 110718->110672 110718->110677 110719->110718 110720 45f1c7 110719->110720 110721 45f278 110719->110721 110720->110718 110725 4078c4 61 API calls 110720->110725 110721->110718 110726 4078c4 61 API calls 110721->110726 110724->110678 110725->110720 110726->110721 110727->110691 110728->110705 110730 409169 Mailbox 110729->110730 110731 43f19f 110730->110731 110736 409173 110730->110736 110732 420db6 Mailbox 59 API calls 110731->110732 110734 43f1ab 110732->110734 110733 40917a 110733->110711 110735 409c90 Mailbox 59 API calls 110735->110736 110736->110733 110736->110735 110763 407a16 110737->110763 110739 40646a 110770 40750f 59 API calls 2 library calls 110739->110770 110741 406484 Mailbox 110741->109744 110744 43dff6 110773 45f8aa 91 API calls 4 library calls 110744->110773 110745 40750f 59 API calls 110756 406265 110745->110756 110749 43e004 110774 40750f 59 API calls 2 library calls 110749->110774 110750 407d8c 59 API calls 110750->110756 110752 43e01a 110752->110741 110753 406799 _memmove 110775 45f8aa 91 API calls 4 library calls 110753->110775 110754 43df92 110755 408029 59 API calls 110754->110755 110757 43df9d 110755->110757 110756->110739 110756->110744 110756->110745 110756->110750 110756->110753 110756->110754 110759 407e4f 59 API calls 110756->110759 110768 405f6c 60 API calls 110756->110768 110769 405d41 59 API calls Mailbox 110756->110769 110771 405e72 60 API calls 110756->110771 110772 407924 59 API calls 2 library calls 110756->110772 110761 420db6 Mailbox 59 API calls 110757->110761 110760 40643b CharUpperBuffW 110759->110760 110760->110756 110761->110753 110762->109748 110764 420db6 Mailbox 59 API calls 110763->110764 110765 407a3b 110764->110765 110766 408029 59 API calls 110765->110766 110767 407a4a 110766->110767 110767->110756 110768->110756 110769->110756 110770->110741 110771->110756 110772->110756 110773->110749 110774->110752 110775->110741 110776->109758 110777->109755 110778->109771 110779->109767 110780->109773 110781->109782 110782->109784 110783->109788 110784->109527 110785->109524 110786->109375 110788 40b91a 110787->110788 110791 40bac7 110787->110791 110789 40bf81 110788->110789 110788->110791 110792 40b9fc 110788->110792 110795 40baab 110788->110795 110789->110795 110812 4094dc 59 API calls wcstoxq 110789->110812 110791->110789 110793 40bb46 110791->110793 110791->110795 110801 40ba8b Mailbox 110791->110801 110792->110793 110794 40ba38 110792->110794 110792->110795 110793->110795 110797 441361 110793->110797 110793->110801 110809 456e8f 59 API calls 110793->110809 110794->110795 110794->110801 110802 4411b4 110794->110802 110795->109405 110795->110795 110797->110795 110810 423d46 59 API calls __wtof_l 110797->110810 110801->109405 110801->110795 110801->110797 110811 408cd4 59 API calls Mailbox 110801->110811 110802->110795 110808 423d46 59 API calls __wtof_l 110802->110808 110803->109405 110804->109400 110805->109406 110806->109409 110807->109406 110808->110802 110809->110801 110810->110795 110811->110801 110812->110795 110813->109415 110814->109439 110815 401066 110820 40f76f 110815->110820 110817 40106c 110818 422d40 __cinit 67 API calls 110817->110818 110819 401076 110818->110819 110821 40f790 110820->110821 110853 41ff03 110821->110853 110825 40f7d7 110826 407667 59 API calls 110825->110826 110827 40f7e1 110826->110827 110828 407667 59 API calls 110827->110828 110829 40f7eb 110828->110829 110830 407667 59 API calls 110829->110830 110831 40f7f5 110830->110831 110832 407667 59 API calls 110831->110832 110833 40f833 110832->110833 110834 407667 59 API calls 110833->110834 110835 40f8fe 110834->110835 110863 415f87 110835->110863 110839 40f930 110840 407667 59 API calls 110839->110840 110841 40f93a 110840->110841 110891 41fd9e 110841->110891 110843 40f981 110844 40f991 GetStdHandle 110843->110844 110845 40f9dd 110844->110845 110846 4445ab 110844->110846 110847 40f9e5 OleInitialize 110845->110847 110846->110845 110848 4445b4 110846->110848 110847->110817 110898 466b38 64 API calls Mailbox 110848->110898 110850 4445bb 110899 467207 CreateThread 110850->110899 110852 4445c7 CloseHandle 110852->110847 110900 41ffdc 110853->110900 110856 41ffdc 59 API calls 110857 41ff45 110856->110857 110858 407667 59 API calls 110857->110858 110859 41ff51 110858->110859 110860 407bcc 59 API calls 110859->110860 110861 40f796 110860->110861 110862 420162 6 API calls 110861->110862 110862->110825 110864 407667 59 API calls 110863->110864 110865 415f97 110864->110865 110866 407667 59 API calls 110865->110866 110867 415f9f 110866->110867 110907 415a9d 110867->110907 110870 415a9d 59 API calls 110871 415faf 110870->110871 110872 407667 59 API calls 110871->110872 110873 415fba 110872->110873 110874 420db6 Mailbox 59 API calls 110873->110874 110875 40f908 110874->110875 110876 4160f9 110875->110876 110877 416107 110876->110877 110878 407667 59 API calls 110877->110878 110879 416112 110878->110879 110880 407667 59 API calls 110879->110880 110881 41611d 110880->110881 110882 407667 59 API calls 110881->110882 110883 416128 110882->110883 110884 407667 59 API calls 110883->110884 110885 416133 110884->110885 110886 415a9d 59 API calls 110885->110886 110887 41613e 110886->110887 110888 420db6 Mailbox 59 API calls 110887->110888 110889 416145 RegisterWindowMessageW 110888->110889 110889->110839 110892 45576f 110891->110892 110893 41fdae 110891->110893 110910 469ae7 60 API calls 110892->110910 110895 420db6 Mailbox 59 API calls 110893->110895 110896 41fdb6 110895->110896 110896->110843 110897 45577a 110898->110850 110899->110852 110911 4671ed 65 API calls 110899->110911 110901 407667 59 API calls 110900->110901 110902 41ffe7 110901->110902 110903 407667 59 API calls 110902->110903 110904 41ffef 110903->110904 110905 407667 59 API calls 110904->110905 110906 41ff3b 110905->110906 110906->110856 110908 407667 59 API calls 110907->110908 110909 415aa5 110908->110909 110909->110870 110910->110897 110912 ad5085 110913 ad506f 110912->110913 110914 ad5089 110912->110914 110917 af8550 110913->110917 110916 ad5078 110939 af8556 110917->110939 110918 af8145 GetLastError 110924 af7dd7 110918->110924 110919 af8579 FreeSid 110919->110939 110920 af8bc1 GetLastError 110920->110939 110921 af83fb GetUserNameW 110921->110924 110922 af8209 GetUserNameW 110922->110924 110941 af7d37 110922->110941 110923 af8986 SetEntriesInAclW 110923->110939 110924->110918 110924->110921 110924->110922 110925 af7d30 110924->110925 110928 af8248 110924->110928 110930 af824a GetLastError 110924->110930 110931 af836e GetLastError 110924->110931 110932 af7d6c GetVolumeInformationW 110924->110932 110933 af7d20 110924->110933 110935 af7fd4 GetLastError 110924->110935 110924->110941 110942 af7f6b GetVolumeInformationW 110924->110942 110925->110932 110925->110941 110926 af890b LocalFree 110926->110939 110927 af89cd OpenMutexW 110927->110916 110928->110930 110930->110916 110931->110924 110932->110916 110933->110925 110933->110932 110936 af7d83 GetWindowsDirectoryW 110933->110936 110940 af7e06 GetComputerNameW 110933->110940 110933->110941 110934 af8599 110934->110925 110937 af896a wsprintfW 110934->110937 110935->110924 110936->110925 110936->110941 110937->110925 110938 af8953 AllocateAndInitializeSid 110938->110939 110939->110917 110939->110918 110939->110919 110939->110920 110939->110923 110939->110924 110939->110925 110939->110926 110939->110927 110939->110933 110939->110934 110939->110937 110939->110938 110939->110941 110940->110941 110941->110916 110942->110924 110943 44416f 110947 455fe6 110943->110947 110945 44417a 110946 455fe6 85 API calls 110945->110946 110946->110945 110948 456020 110947->110948 110953 455ff3 110947->110953 110948->110945 110949 456022 110959 409328 84 API calls Mailbox 110949->110959 110951 456027 110952 409837 84 API calls 110951->110952 110954 45602e 110952->110954 110953->110948 110953->110949 110953->110951 110956 45601a 110953->110956 110955 407b2e 59 API calls 110954->110955 110955->110948 110958 4095a0 59 API calls _wcsstr 110956->110958 110958->110948 110959->110951 110960 40e5ab 110963 40d100 110960->110963 110962 40e5b9 110964 40d11d 110963->110964 110992 40d37d 110963->110992 110965 4426e0 110964->110965 110966 442691 110964->110966 110996 40d144 110964->110996 111007 47a3e6 341 API calls __cinit 110965->111007 110969 442694 110966->110969 110975 4426af 110966->110975 110970 4426a0 110969->110970 110969->110996 111005 47a9fa 341 API calls 110970->111005 110971 422d40 __cinit 67 API calls 110971->110996 110974 40d54b 110974->110962 110975->110992 111006 47aea2 341 API calls 3 library calls 110975->111006 110976 40d434 110999 408a52 68 API calls 110976->110999 110977 4428b5 110977->110977 110981 40d443 110981->110962 110982 4427fc 111010 47a751 89 API calls 110982->111010 110986 4084c0 69 API calls 110986->110996 110990 409d3c 60 API calls 110990->110996 110992->110974 111011 469e4a 89 API calls 4 library calls 110992->111011 110993 409ea0 341 API calls 110993->110996 110994 408047 59 API calls 110994->110996 110996->110971 110996->110974 110996->110976 110996->110982 110996->110986 110996->110990 110996->110992 110996->110993 110996->110994 110997 408740 68 API calls __cinit 110996->110997 110998 408542 68 API calls 110996->110998 111000 40843a 68 API calls 110996->111000 111001 40cf7c 341 API calls 110996->111001 111002 409dda 59 API calls Mailbox 110996->111002 111003 40cf00 89 API calls 110996->111003 111004 40cd7d 341 API calls 110996->111004 111008 408a52 68 API calls 110996->111008 111009 45678d 60 API calls 110996->111009 110997->110996 110998->110996 110999->110981 111000->110996 111001->110996 111002->110996 111003->110996 111004->110996 111005->110974 111006->110992 111007->110996 111008->110996 111009->110996 111010->110992 111011->110977 111012 adb180 111014 adb0de 111012->111014 111013 adb2a7 SetFilePointerEx 111015 adb1c6 111013->111015 111017 adb1df 111013->111017 111014->111012 111014->111013 111016 adb196 111014->111016 111019 adb328 SetFilePointerEx 111014->111019 111022 adb253 111014->111022 111023 adb0d0 SetFilePointerEx 111014->111023 111015->111017 111021 adb2e0 WriteFile 111015->111021 111016->111015 111018 adb3a6 111016->111018 111018->111019 111020 adb3b2 111018->111020 111023->111014 111024 adb054 111023->111024 111025 ad7b22 111026 ad7b2b 111025->111026 111028 ad5f10 111025->111028 111027 ad6084 SetFilePointerEx 111027->111028 111028->111027 111029 ad5d90 111028->111029 111030 403633 111031 40366a 111030->111031 111032 4036e7 111031->111032 111033 403688 111031->111033 111071 4036e5 111031->111071 111037 4036ed 111032->111037 111038 43d0cc 111032->111038 111034 403695 111033->111034 111035 40374b PostQuitMessage 111033->111035 111042 4036a0 111034->111042 111043 43d154 111034->111043 111061 4036d8 111035->111061 111036 4036ca DefWindowProcW 111036->111061 111039 4036f2 111037->111039 111040 403715 SetTimer RegisterWindowMessageW 111037->111040 111085 411070 10 API calls Mailbox 111038->111085 111044 4036f9 KillTimer 111039->111044 111045 43d06f 111039->111045 111047 40373e CreatePopupMenu 111040->111047 111040->111061 111048 403755 111042->111048 111049 4036a8 111042->111049 111101 462527 71 API calls _memset 111043->111101 111082 40443a Shell_NotifyIconW _memset 111044->111082 111056 43d074 111045->111056 111057 43d0a8 MoveWindow 111045->111057 111046 43d0f3 111086 411093 341 API calls Mailbox 111046->111086 111047->111061 111075 4044a0 111048->111075 111053 4036b3 111049->111053 111054 43d139 111049->111054 111059 43d124 111053->111059 111067 4036be 111053->111067 111054->111036 111100 457c36 59 API calls Mailbox 111054->111100 111062 43d097 SetFocus 111056->111062 111063 43d078 111056->111063 111057->111061 111058 40370c 111083 403114 DeleteObject DestroyWindow Mailbox 111058->111083 111099 462d36 81 API calls _memset 111059->111099 111060 43d166 111060->111036 111060->111061 111062->111061 111063->111067 111068 43d081 111063->111068 111067->111036 111087 40443a Shell_NotifyIconW _memset 111067->111087 111084 411070 10 API calls Mailbox 111068->111084 111070 43d134 111070->111061 111071->111036 111073 43d118 111088 40434a 111073->111088 111076 4044b7 _memset 111075->111076 111077 404539 111075->111077 111102 40407c 111076->111102 111077->111061 111079 404522 KillTimer SetTimer 111079->111077 111080 4044de 111080->111079 111081 43d4ab Shell_NotifyIconW 111080->111081 111081->111079 111082->111058 111083->111061 111084->111061 111085->111046 111086->111067 111087->111073 111089 404375 _memset 111088->111089 111124 404182 111089->111124 111092 4043fa 111094 404430 Shell_NotifyIconW 111092->111094 111095 404414 Shell_NotifyIconW 111092->111095 111096 404422 111094->111096 111095->111096 111097 40407c 61 API calls 111096->111097 111098 404429 111097->111098 111098->111071 111099->111070 111100->111071 111101->111060 111103 404098 111102->111103 111104 40416f Mailbox 111102->111104 111105 407a16 59 API calls 111103->111105 111104->111080 111106 4040a6 111105->111106 111107 4040b3 111106->111107 111108 43d3c8 LoadStringW 111106->111108 111109 407bcc 59 API calls 111107->111109 111111 43d3e2 111108->111111 111110 4040c8 111109->111110 111110->111111 111112 4040d9 111110->111112 111113 407b2e 59 API calls 111111->111113 111114 4040e3 111112->111114 111115 404174 111112->111115 111118 43d3ec 111113->111118 111117 407b2e 59 API calls 111114->111117 111116 408047 59 API calls 111115->111116 111121 4040ed _memset _wcscpy 111116->111121 111117->111121 111119 407cab 59 API calls 111118->111119 111118->111121 111120 43d40e 111119->111120 111123 407cab 59 API calls 111120->111123 111122 404155 Shell_NotifyIconW 111121->111122 111122->111104 111123->111121 111125 43d423 111124->111125 111126 404196 111124->111126 111125->111126 111127 43d42c DestroyIcon 111125->111127 111126->111092 111128 462f94 62 API calls _W_store_winword 111126->111128 111127->111126 111128->111092 111129 427c56 111130 427c62 111129->111130 111166 429e08 GetStartupInfoW 111130->111166 111133 427c67 111168 428b7c GetProcessHeap 111133->111168 111134 427cbf 111135 427cca 111134->111135 111251 427da6 58 API calls 3 library calls 111134->111251 111169 429ae6 111135->111169 111138 427cd0 111139 427cdb __RTC_Initialize 111138->111139 111252 427da6 58 API calls 3 library calls 111138->111252 111190 42d5d2 111139->111190 111142 427cea 111143 427cf6 GetCommandLineW 111142->111143 111253 427da6 58 API calls 3 library calls 111142->111253 111209 434f23 GetEnvironmentStringsW 111143->111209 111146 427cf5 111146->111143 111149 427d10 111150 427d1b 111149->111150 111254 4230b5 58 API calls 3 library calls 111149->111254 111219 434d58 111150->111219 111153 427d21 111154 427d2c 111153->111154 111255 4230b5 58 API calls 3 library calls 111153->111255 111233 4230ef 111154->111233 111157 427d34 111158 427d3f __wwincmdln 111157->111158 111256 4230b5 58 API calls 3 library calls 111157->111256 111239 4047d0 111158->111239 111161 427d53 111162 427d62 111161->111162 111257 423358 58 API calls _doexit 111161->111257 111258 4230e0 58 API calls _doexit 111162->111258 111165 427d67 __fcloseall 111167 429e1e 111166->111167 111167->111133 111168->111134 111259 423187 36 API calls 2 library calls 111169->111259 111171 429aeb 111260 429d3c InitializeCriticalSectionAndSpinCount __getstream 111171->111260 111173 429af0 111174 429af4 111173->111174 111262 429d8a TlsAlloc 111173->111262 111261 429b5c 61 API calls 2 library calls 111174->111261 111177 429af9 111177->111138 111178 429b06 111178->111174 111179 429b11 111178->111179 111263 4287d5 111179->111263 111181 429b53 111271 429b5c 61 API calls 2 library calls 111181->111271 111185 429b32 111185->111181 111187 429b38 111185->111187 111186 429b58 111186->111138 111270 429a33 58 API calls 4 library calls 111187->111270 111189 429b40 GetCurrentThreadId 111189->111138 111191 42d5de __fcloseall 111190->111191 111192 429c0b __lock 58 API calls 111191->111192 111193 42d5e5 111192->111193 111194 4287d5 __calloc_crt 58 API calls 111193->111194 111195 42d5f6 111194->111195 111196 42d661 GetStartupInfoW 111195->111196 111197 42d601 __fcloseall @_EH4_CallFilterFunc@8 111195->111197 111198 42d7a5 111196->111198 111200 42d676 111196->111200 111197->111142 111199 42d86d 111198->111199 111203 42d7f2 GetStdHandle 111198->111203 111205 42d805 GetFileType 111198->111205 111284 429e2b InitializeCriticalSectionAndSpinCount 111198->111284 111285 42d87d LeaveCriticalSection _doexit 111199->111285 111200->111198 111202 4287d5 __calloc_crt 58 API calls 111200->111202 111204 42d6c4 111200->111204 111202->111200 111203->111198 111204->111198 111206 42d6f8 GetFileType 111204->111206 111283 429e2b InitializeCriticalSectionAndSpinCount 111204->111283 111205->111198 111206->111204 111210 434f34 111209->111210 111211 427d06 111209->111211 111286 42881d 58 API calls 2 library calls 111210->111286 111215 434b1b GetModuleFileNameW 111211->111215 111213 434f5a _memmove 111214 434f70 FreeEnvironmentStringsW 111213->111214 111214->111211 111216 434b4f _wparse_cmdline 111215->111216 111218 434b8f _wparse_cmdline 111216->111218 111287 42881d 58 API calls 2 library calls 111216->111287 111218->111149 111220 434d71 __NMSG_WRITE 111219->111220 111224 434d69 111219->111224 111221 4287d5 __calloc_crt 58 API calls 111220->111221 111226 434d9a __NMSG_WRITE 111221->111226 111222 434df1 111223 422d55 _free 58 API calls 111222->111223 111223->111224 111224->111153 111225 4287d5 __calloc_crt 58 API calls 111225->111226 111226->111222 111226->111224 111226->111225 111227 434e16 111226->111227 111230 434e2d 111226->111230 111288 434607 58 API calls 2 library calls 111226->111288 111229 422d55 _free 58 API calls 111227->111229 111229->111224 111289 428dc6 IsProcessorFeaturePresent 111230->111289 111232 434e39 111232->111153 111235 4230fb __IsNonwritableInCurrentImage 111233->111235 111304 42a4d1 111235->111304 111236 423119 __initterm_e 111237 422d40 __cinit 67 API calls 111236->111237 111238 423138 _doexit __IsNonwritableInCurrentImage 111236->111238 111237->111238 111238->111157 111240 4047ea 111239->111240 111250 404889 111239->111250 111241 404824 IsThemeActive 111240->111241 111307 42336c 111241->111307 111245 404850 111319 4048fd SystemParametersInfoW SystemParametersInfoW 111245->111319 111247 40485c 111320 403b3a 111247->111320 111249 404864 SystemParametersInfoW 111249->111250 111250->111161 111251->111135 111252->111139 111253->111146 111257->111162 111258->111165 111259->111171 111260->111173 111261->111177 111262->111178 111264 4287dc 111263->111264 111266 428817 111264->111266 111268 4287fa 111264->111268 111272 4351f6 111264->111272 111266->111181 111269 429de6 TlsSetValue 111266->111269 111268->111264 111268->111266 111280 42a132 Sleep 111268->111280 111269->111185 111270->111189 111271->111186 111273 435201 111272->111273 111275 43521c 111272->111275 111274 43520d 111273->111274 111273->111275 111281 428b28 58 API calls __getptd_noexit 111274->111281 111277 43522c HeapAlloc 111275->111277 111278 435212 111275->111278 111282 4233a1 DecodePointer 111275->111282 111277->111275 111277->111278 111278->111264 111280->111268 111281->111278 111282->111275 111283->111204 111284->111198 111285->111197 111286->111213 111287->111218 111288->111226 111290 428dd1 111289->111290 111295 428c59 111290->111295 111294 428dec 111294->111232 111296 428c73 _memset ___raise_securityfailure 111295->111296 111297 428c93 IsDebuggerPresent 111296->111297 111303 42a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 111297->111303 111299 42c5f6 ___crt_atoflt_l 6 API calls 111301 428d7a 111299->111301 111300 428d57 ___raise_securityfailure 111300->111299 111302 42a140 GetCurrentProcess TerminateProcess 111301->111302 111302->111294 111303->111300 111305 42a4d4 EncodePointer 111304->111305 111305->111305 111306 42a4ee 111305->111306 111306->111236 111308 429c0b __lock 58 API calls 111307->111308 111309 423377 DecodePointer EncodePointer 111308->111309 111372 429d75 LeaveCriticalSection 111309->111372 111311 404849 111312 4233d4 111311->111312 111313 4233f8 111312->111313 111314 4233de 111312->111314 111313->111245 111314->111313 111373 428b28 58 API calls __getptd_noexit 111314->111373 111316 4233e8 111374 428db6 9 API calls __snwprintf 111316->111374 111318 4233f3 111318->111245 111319->111247 111321 403b47 __ftell_nolock 111320->111321 111322 407667 59 API calls 111321->111322 111323 403b51 GetCurrentDirectoryW 111322->111323 111375 403766 111323->111375 111325 403b7a IsDebuggerPresent 111326 43d272 MessageBoxA 111325->111326 111327 403b88 111325->111327 111329 43d28c 111326->111329 111327->111329 111330 403ba5 111327->111330 111359 403c61 111327->111359 111328 403c68 SetCurrentDirectoryW 111331 403c75 Mailbox 111328->111331 111497 407213 59 API calls Mailbox 111329->111497 111456 407285 111330->111456 111331->111249 111334 43d29c 111340 43d2b2 SetCurrentDirectoryW 111334->111340 111340->111331 111359->111328 111372->111311 111373->111316 111374->111318 111376 407667 59 API calls 111375->111376 111377 40377c 111376->111377 111506 403d31 111377->111506 111379 40379a 111380 404706 61 API calls 111379->111380 111381 4037ae 111380->111381 111382 407de1 59 API calls 111381->111382 111383 4037bb 111382->111383 111384 404ddd 136 API calls 111383->111384 111385 4037d4 111384->111385 111386 43d173 111385->111386 111387 4037dc Mailbox 111385->111387 111548 46955b 111386->111548 111391 408047 59 API calls 111387->111391 111390 43d192 111393 422d55 _free 58 API calls 111390->111393 111394 4037ef 111391->111394 111392 404e4a 84 API calls 111392->111390 111395 43d19f 111393->111395 111520 40928a 111394->111520 111398 404e4a 84 API calls 111395->111398 111399 43d1a8 111398->111399 111403 403ed0 59 API calls 111399->111403 111400 407de1 59 API calls 111401 403808 111400->111401 111402 4084c0 69 API calls 111401->111402 111404 40381a Mailbox 111402->111404 111405 43d1c3 111403->111405 111406 407de1 59 API calls 111404->111406 111407 403ed0 59 API calls 111405->111407 111408 403840 111406->111408 111409 43d1df 111407->111409 111410 4084c0 69 API calls 111408->111410 111411 404706 61 API calls 111409->111411 111413 40384f Mailbox 111410->111413 111412 43d204 111411->111412 111414 403ed0 59 API calls 111412->111414 111416 407667 59 API calls 111413->111416 111415 43d210 111414->111415 111418 408047 59 API calls 111415->111418 111417 40386d 111416->111417 111523 403ed0 111417->111523 111419 43d21e 111418->111419 111421 403ed0 59 API calls 111419->111421 111423 43d22d 111421->111423 111429 408047 59 API calls 111423->111429 111425 403887 111425->111399 111426 403891 111425->111426 111427 422efd _W_store_winword 60 API calls 111426->111427 111428 40389c 111427->111428 111428->111405 111430 4038a6 111428->111430 111431 43d24f 111429->111431 111432 422efd _W_store_winword 60 API calls 111430->111432 111433 403ed0 59 API calls 111431->111433 111434 4038b1 111432->111434 111435 43d25c 111433->111435 111434->111409 111436 4038bb 111434->111436 111435->111435 111437 422efd _W_store_winword 60 API calls 111436->111437 111438 4038c6 111437->111438 111438->111423 111439 403907 111438->111439 111441 403ed0 59 API calls 111438->111441 111439->111423 111440 403914 111439->111440 111443 4092ce 59 API calls 111440->111443 111442 4038ea 111441->111442 111444 408047 59 API calls 111442->111444 111445 403924 111443->111445 111446 4038f8 111444->111446 111447 409050 59 API calls 111445->111447 111448 403ed0 59 API calls 111446->111448 111449 403932 111447->111449 111448->111439 111539 408ee0 111449->111539 111451 40394f 111452 40928a 59 API calls 111451->111452 111453 408ee0 60 API calls 111451->111453 111454 403ed0 59 API calls 111451->111454 111455 403995 Mailbox 111451->111455 111452->111451 111453->111451 111454->111451 111455->111325 111457 407292 __ftell_nolock 111456->111457 111458 43ea22 _memset 111457->111458 111459 4072ab 111457->111459 111462 43ea3e GetOpenFileNameW 111458->111462 111593 404750 111459->111593 111464 43ea8d 111462->111464 111466 407bcc 59 API calls 111464->111466 111468 43eaa2 111466->111468 111468->111468 111469 4072c9 111621 40686a 111469->111621 111497->111334 111507 403d3e __ftell_nolock 111506->111507 111508 407bcc 59 API calls 111507->111508 111513 403ea4 Mailbox 111507->111513 111510 403d70 111508->111510 111509 4079f2 59 API calls 111509->111510 111510->111509 111519 403da6 Mailbox 111510->111519 111511 4079f2 59 API calls 111511->111519 111512 403e77 111512->111513 111514 407de1 59 API calls 111512->111514 111513->111379 111516 403e98 111514->111516 111515 407de1 59 API calls 111515->111519 111517 403f74 59 API calls 111516->111517 111517->111513 111519->111511 111519->111512 111519->111513 111519->111515 111583 403f74 111519->111583 111521 420db6 Mailbox 59 API calls 111520->111521 111522 4037fb 111521->111522 111522->111400 111524 403ef3 111523->111524 111525 403eda 111523->111525 111527 407bcc 59 API calls 111524->111527 111526 408047 59 API calls 111525->111526 111528 403879 111526->111528 111527->111528 111529 422efd 111528->111529 111530 422f09 111529->111530 111531 422f7e 111529->111531 111537 422f2e 111530->111537 111589 428b28 58 API calls __getptd_noexit 111530->111589 111591 422f90 60 API calls 4 library calls 111531->111591 111534 422f8b 111534->111425 111535 422f15 111590 428db6 9 API calls __snwprintf 111535->111590 111537->111425 111538 422f20 111538->111425 111540 43f17c 111539->111540 111544 408ef7 111539->111544 111540->111544 111592 408bdb 59 API calls Mailbox 111540->111592 111542 409040 111546 409d3c 60 API calls 111542->111546 111543 408ff8 111545 420db6 Mailbox 59 API calls 111543->111545 111544->111542 111544->111543 111547 408fff 111544->111547 111545->111547 111546->111547 111547->111451 111549 404ee5 85 API calls 111548->111549 111550 4695ca 111549->111550 111551 469734 96 API calls 111550->111551 111552 4695dc 111551->111552 111553 404f0b 74 API calls 111552->111553 111581 43d186 111552->111581 111554 4695f7 111553->111554 111555 404f0b 74 API calls 111554->111555 111556 469607 111555->111556 111557 404f0b 74 API calls 111556->111557 111558 469622 111557->111558 111559 404f0b 74 API calls 111558->111559 111560 46963d 111559->111560 111561 404ee5 85 API calls 111560->111561 111562 469654 111561->111562 111563 42571c __malloc_crt 58 API calls 111562->111563 111564 46965b 111563->111564 111565 42571c __malloc_crt 58 API calls 111564->111565 111566 469665 111565->111566 111567 404f0b 74 API calls 111566->111567 111568 469679 111567->111568 111569 469109 GetSystemTimeAsFileTime 111568->111569 111570 46968c 111569->111570 111571 4696b6 111570->111571 111572 4696a1 111570->111572 111574 4696bc 111571->111574 111575 46971b 111571->111575 111573 422d55 _free 58 API calls 111572->111573 111576 4696a7 111573->111576 111577 468b06 116 API calls 111574->111577 111578 422d55 _free 58 API calls 111575->111578 111579 422d55 _free 58 API calls 111576->111579 111580 469713 111577->111580 111578->111581 111579->111581 111582 422d55 _free 58 API calls 111580->111582 111581->111390 111581->111392 111582->111581 111584 403f82 111583->111584 111588 403fa4 _memmove 111583->111588 111586 420db6 Mailbox 59 API calls 111584->111586 111585 420db6 Mailbox 59 API calls 111587 403fb8 111585->111587 111586->111588 111587->111519 111588->111585 111589->111535 111590->111538 111591->111534 111592->111544 111655 431940 111593->111655 111596 404799 111598 407d8c 59 API calls 111596->111598 111597 40477c 111599 407bcc 59 API calls 111597->111599 111600 404788 111598->111600 111599->111600 111657 407726 111600->111657 111603 420791 111604 431940 __ftell_nolock 111603->111604 111605 42079e GetLongPathNameW 111604->111605 111606 407bcc 59 API calls 111605->111606 111607 4072bd 111606->111607 111608 40700b 111607->111608 111609 407667 59 API calls 111608->111609 111610 40701d 111609->111610 111611 404750 60 API calls 111610->111611 111612 407028 111611->111612 111613 407033 111612->111613 111617 43e885 111612->111617 111614 403f74 59 API calls 111613->111614 111616 40703f 111614->111616 111661 4034c2 111616->111661 111619 43e89f 111617->111619 111667 407908 61 API calls 111617->111667 111620 407052 Mailbox 111620->111469 111622 404ddd 136 API calls 111621->111622 111623 40688f 111622->111623 111624 43e031 111623->111624 111625 404ddd 136 API calls 111623->111625 111626 46955b 122 API calls 111624->111626 111627 4068a3 111625->111627 111628 43e046 111626->111628 111627->111624 111629 4068ab 111627->111629 111630 43e067 111628->111630 111631 43e04a 111628->111631 111633 43e052 111629->111633 111634 4068b7 111629->111634 111632 420db6 Mailbox 59 API calls 111630->111632 111635 404e4a 84 API calls 111631->111635 111654 43e0ac Mailbox 111632->111654 111770 4642f8 90 API calls _wprintf 111633->111770 111668 406a8c 111634->111668 111635->111633 111639 43e060 111639->111630 111640 43e260 111648 43e271 111651 407de1 59 API calls 111651->111654 111654->111640 111654->111648 111654->111651 111761 45f73d 111654->111761 111764 46737f 111654->111764 111771 45f65e 61 API calls 2 library calls 111654->111771 111772 40750f 59 API calls 2 library calls 111654->111772 111656 40475d GetFullPathNameW 111655->111656 111656->111596 111656->111597 111658 407734 111657->111658 111659 407d2c 59 API calls 111658->111659 111660 404794 111659->111660 111660->111603 111662 4034f3 _memmove 111661->111662 111663 4034d4 111661->111663 111664 420db6 Mailbox 59 API calls 111662->111664 111665 420db6 Mailbox 59 API calls 111663->111665 111666 40350a 111664->111666 111665->111662 111666->111620 111667->111617 111669 406ab5 111668->111669 111670 43e41e 111668->111670 111780 4057a6 60 API calls Mailbox 111669->111780 111770->111639 111771->111654 111772->111654 111826 401055 111831 402649 111826->111831 111829 422d40 __cinit 67 API calls 111830 401064 111829->111830 111832 407667 59 API calls 111831->111832 111833 4026b7 111832->111833 111838 403582 111833->111838 111835 402754 111836 40105a 111835->111836 111841 403416 59 API calls 2 library calls 111835->111841 111836->111829 111842 4035b0 111838->111842 111841->111835 111843 4035bd 111842->111843 111844 4035a1 111842->111844 111843->111844 111845 4035c4 RegOpenKeyExW 111843->111845 111844->111835 111845->111844 111846 4035de RegQueryValueExW 111845->111846 111847 403614 RegCloseKey 111846->111847 111848 4035ff 111846->111848 111847->111844 111848->111847 111849 401016 111854 404974 111849->111854 111852 422d40 __cinit 67 API calls 111853 401025 111852->111853 111855 420db6 Mailbox 59 API calls 111854->111855 111856 40497c 111855->111856 111857 40101b 111856->111857 111861 404936 111856->111861 111857->111852 111862 404951 111861->111862 111863 40493f 111861->111863 111865 4049a0 111862->111865 111864 422d40 __cinit 67 API calls 111863->111864 111864->111862 111866 407667 59 API calls 111865->111866 111867 4049b8 GetVersionExW 111866->111867 111868 407bcc 59 API calls 111867->111868 111869 4049fb 111868->111869 111870 407d2c 59 API calls 111869->111870 111879 404a28 111869->111879 111871 404a1c 111870->111871 111872 407726 59 API calls 111871->111872 111872->111879 111873 404a93 GetCurrentProcess IsWow64Process 111874 404aac 111873->111874 111876 404ac2 111874->111876 111877 404b2b GetSystemInfo 111874->111877 111875 43d864 111889 404b37 111876->111889 111878 404af8 111877->111878 111878->111857 111879->111873 111879->111875 111882 404ad4 111885 404b37 2 API calls 111882->111885 111883 404b1f GetSystemInfo 111884 404ae9 111883->111884 111884->111878 111887 404aef FreeLibrary 111884->111887 111886 404adc GetNativeSystemInfo 111885->111886 111886->111884 111887->111878 111890 404ad0 111889->111890 111891 404b40 LoadLibraryA 111889->111891 111890->111882 111890->111883 111891->111890 111892 404b51 GetProcAddress 111891->111892 111892->111890 111893 ad5a3b 111894 ad5a45 111893->111894 111899 ad4f7c 111893->111899 111895 ad51ae 111894->111895 111896 ad5a4b CreateThread 111894->111896 111897 ad5a59 RtlExitUserThread 111896->111897 111903 ad5b1d 111897->111903 111898 ad4f88 111899->111898 111901 ad5d20 2 API calls 111899->111901 111902 ad4f99 111901->111902 111904 ad5d20 2 API calls 111903->111904 111905 ad5b3c 111904->111905 111905->111905 111906 401078 111911 40708b 111906->111911 111908 40108c 111909 422d40 __cinit 67 API calls 111908->111909 111910 401096 111909->111910 111912 40709b __ftell_nolock 111911->111912 111913 407667 59 API calls 111912->111913 111914 407151 111913->111914 111915 404706 61 API calls 111914->111915 111916 40715a 111915->111916 111942 42050b 111916->111942 111919 407cab 59 API calls 111920 407173 111919->111920 111921 403f74 59 API calls 111920->111921 111922 407182 111921->111922 111923 407667 59 API calls 111922->111923 111924 40718b 111923->111924 111925 407d8c 59 API calls 111924->111925 111926 407194 RegOpenKeyExW 111925->111926 111927 43e8b1 RegQueryValueExW 111926->111927 111931 4071b6 Mailbox 111926->111931 111928 43e943 RegCloseKey 111927->111928 111929 43e8ce 111927->111929 111928->111931 111941 43e955 _wcscat Mailbox __NMSG_WRITE 111928->111941 111930 420db6 Mailbox 59 API calls 111929->111930 111932 43e8e7 111930->111932 111931->111908 111933 40522e 59 API calls 111932->111933 111934 43e8f2 RegQueryValueExW 111933->111934 111936 43e90f 111934->111936 111938 43e929 111934->111938 111935 4079f2 59 API calls 111935->111941 111937 407bcc 59 API calls 111936->111937 111937->111938 111938->111928 111939 407de1 59 API calls 111939->111941 111940 403f74 59 API calls 111940->111941 111941->111931 111941->111935 111941->111939 111941->111940 111943 431940 __ftell_nolock 111942->111943 111944 420518 GetFullPathNameW 111943->111944 111945 42053a 111944->111945 111946 407bcc 59 API calls 111945->111946 111947 407165 111946->111947 111947->111919 111948 e87b90 111962 e857e0 111948->111962 111950 e87c51 111965 e87a80 111950->111965 111968 e88c80 GetPEB 111962->111968 111964 e85e6b 111964->111950 111966 e87a89 Sleep 111965->111966 111967 e87a97 111966->111967 111969 e88caa 111968->111969 111969->111964 111970 40be19 111971 40be22 111970->111971 111984 40baab 111970->111984 111972 409837 84 API calls 111971->111972 111980 40ba8b Mailbox 111971->111980 111971->111984 111973 40be4d 111972->111973 111974 40be5d 111973->111974 111975 44107b 111973->111975 111977 407a51 59 API calls 111974->111977 111985 457bdb 59 API calls _memmove 111975->111985 111977->111980 111978 441085 111979 408047 59 API calls 111978->111979 111979->111980 111982 441361 111980->111982 111980->111984 111987 408cd4 59 API calls Mailbox 111980->111987 111982->111984 111986 423d46 59 API calls __wtof_l 111982->111986 111985->111978 111986->111984 111987->111980 111988 adaaf0 111989 adab06 111988->111989 111993 adab57 111989->111993 111994 ad6490 111989->111994 111996 ad5f10 111994->111996 111997 ad5d90 111994->111997 111995 ad6084 SetFilePointerEx 111995->111996 111996->111995 111996->111997 111998 b0faf0 111997->111998 111999 b0fafd 111998->111999 112003 b0fb84 111998->112003 112002 b0fb2a 111999->112002 111999->112003 112001 b108d6 112001->111993 112004 b1032f 112002->112004 112017 b11a1b 21 API calls 2 library calls 112002->112017 112005 b0fc05 112003->112005 112011 b0fbda 112003->112011 112004->111993 112008 b0fc38 112005->112008 112016 b10fe0 21 API calls __startOneArgErrorHandling 112005->112016 112007 b0fc22 112007->111993 112008->111993 112009 b11167 112018 b10ff7 21 API calls __startOneArgErrorHandling 112009->112018 112010 b1116e 112019 b10fe0 21 API calls __startOneArgErrorHandling 112010->112019 112011->112008 112011->112009 112011->112010 112014 b1116c 112014->111993 112015 b11173 112015->111993 112016->112007 112017->112001 112018->112014 112019->112015 112020 43fdfc 112060 40ab30 Mailbox _memmove 112020->112060 112022 45617e Mailbox 59 API calls 112048 40a057 112022->112048 112023 409c90 Mailbox 59 API calls 112023->112060 112024 420db6 59 API calls Mailbox 112024->112060 112027 40b525 112136 469e4a 89 API calls 4 library calls 112027->112136 112028 440055 112135 469e4a 89 API calls 4 library calls 112028->112135 112031 420db6 59 API calls Mailbox 112046 409f37 Mailbox 112031->112046 112032 40b475 112036 408047 59 API calls 112032->112036 112033 40b900 60 API calls 112033->112046 112034 440064 112036->112048 112038 40b47a 112038->112028 112049 4409e5 112038->112049 112039 408047 59 API calls 112039->112046 112041 407667 59 API calls 112041->112046 112042 456e8f 59 API calls 112042->112046 112043 422d40 67 API calls __cinit 112043->112046 112044 407de1 59 API calls 112044->112060 112045 4409d6 112139 469e4a 89 API calls 4 library calls 112045->112139 112046->112028 112046->112031 112046->112032 112046->112033 112046->112038 112046->112039 112046->112041 112046->112042 112046->112043 112046->112045 112046->112048 112050 40a55a 112046->112050 112132 40c8c0 341 API calls 2 library calls 112046->112132 112140 469e4a 89 API calls 4 library calls 112049->112140 112138 469e4a 89 API calls 4 library calls 112050->112138 112051 47bc6b 341 API calls 112051->112060 112053 40b2b6 112133 40f6a3 341 API calls 112053->112133 112054 409ea0 341 API calls 112054->112060 112056 44086a 112057 409c90 Mailbox 59 API calls 112056->112057 112061 44085c 112057->112061 112058 440878 112137 469e4a 89 API calls 4 library calls 112058->112137 112060->112023 112060->112024 112060->112027 112060->112044 112060->112046 112060->112048 112060->112051 112060->112053 112060->112054 112060->112056 112060->112058 112060->112061 112062 40b21c 112060->112062 112066 456e8f 59 API calls 112060->112066 112070 47445a 341 API calls 112060->112070 112071 47df23 112060->112071 112074 468715 112060->112074 112078 48241e 112060->112078 112091 47c2e0 112060->112091 112123 467956 112060->112123 112129 45617e 112060->112129 112134 47c193 85 API calls 2 library calls 112060->112134 112061->112022 112061->112048 112063 409d3c 60 API calls 112062->112063 112064 40b22d 112063->112064 112065 409d3c 60 API calls 112064->112065 112065->112053 112066->112060 112070->112060 112072 47cadd 130 API calls 112071->112072 112073 47df33 112072->112073 112073->112060 112075 468723 112074->112075 112076 46871e 112074->112076 112075->112060 112141 4677b3 112076->112141 112079 409837 84 API calls 112078->112079 112080 482436 112079->112080 112081 407667 59 API calls 112080->112081 112082 482444 112081->112082 112083 409b3c 59 API calls 112082->112083 112084 48244f 112083->112084 112085 482479 112084->112085 112087 409837 84 API calls 112084->112087 112164 409a3c 59 API calls Mailbox 112085->112164 112089 48246a 112087->112089 112088 482485 Mailbox 112088->112060 112090 40784b 59 API calls 112089->112090 112090->112085 112092 407667 59 API calls 112091->112092 112093 47c2f4 112092->112093 112094 407667 59 API calls 112093->112094 112095 47c2fc 112094->112095 112096 407667 59 API calls 112095->112096 112097 47c304 112096->112097 112098 409837 84 API calls 112097->112098 112122 47c312 112098->112122 112099 407bcc 59 API calls 112099->112122 112100 47c4fb 112101 47c528 Mailbox 112100->112101 112167 409a3c 59 API calls Mailbox 112100->112167 112101->112060 112103 47c4e2 112104 407cab 59 API calls 112103->112104 112108 47c4ef 112104->112108 112105 407924 59 API calls 112105->112122 112106 47c4fd 112109 407cab 59 API calls 112106->112109 112107 408047 59 API calls 112107->112122 112111 407b2e 59 API calls 112108->112111 112112 47c50c 112109->112112 112110 407e4f 59 API calls 112113 47c3a9 CharUpperBuffW 112110->112113 112111->112100 112114 407b2e 59 API calls 112112->112114 112165 40843a 68 API calls 112113->112165 112114->112100 112115 407e4f 59 API calls 112117 47c469 CharUpperBuffW 112115->112117 112166 40c5a7 69 API calls 2 library calls 112117->112166 112119 409837 84 API calls 112119->112122 112120 407cab 59 API calls 112120->112122 112121 407b2e 59 API calls 112121->112122 112122->112099 112122->112100 112122->112101 112122->112103 112122->112105 112122->112106 112122->112107 112122->112110 112122->112115 112122->112119 112122->112120 112122->112121 112124 467962 112123->112124 112125 420db6 Mailbox 59 API calls 112124->112125 112126 467970 112125->112126 112127 46797e 112126->112127 112128 407667 59 API calls 112126->112128 112127->112060 112128->112127 112168 4560c0 112129->112168 112131 45618c 112131->112060 112132->112046 112133->112027 112134->112060 112135->112034 112136->112061 112137->112061 112138->112048 112139->112049 112140->112048 112142 4677ca 112141->112142 112158 4678ea 112141->112158 112143 4677e2 112142->112143 112145 46780a 112142->112145 112146 467821 112142->112146 112143->112145 112147 4677f2 112143->112147 112144 420db6 Mailbox 59 API calls 112153 467800 Mailbox _memmove 112144->112153 112145->112144 112150 420db6 Mailbox 59 API calls 112146->112150 112160 46783e 112146->112160 112154 420db6 Mailbox 59 API calls 112147->112154 112148 467877 112152 420db6 Mailbox 59 API calls 112148->112152 112149 467869 112151 420db6 Mailbox 59 API calls 112149->112151 112150->112160 112151->112153 112155 46787d 112152->112155 112156 420db6 Mailbox 59 API calls 112153->112156 112154->112153 112162 46746b 59 API calls Mailbox 112155->112162 112156->112158 112158->112075 112159 467889 112163 405a15 61 API calls Mailbox 112159->112163 112160->112148 112160->112149 112160->112153 112162->112159 112163->112153 112164->112088 112165->112122 112166->112122 112167->112101 112169 4560e8 112168->112169 112170 4560cb 112168->112170 112169->112131 112170->112169 112172 4560ab 59 API calls Mailbox 112170->112172 112172->112170
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1408264425.0000000000AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: d$w
                                                          • API String ID: 0-2400632791
                                                          • Opcode ID: 1628b36fe1eeb20d470e67bc4b7b69b220eec050dcf40fb335ee9ca24f967d24
                                                          • Instruction ID: 7b3a42f20b837f38c0469a9a6cf1f6ce76820cb60271852b3cd27584a12d9d95
                                                          • Opcode Fuzzy Hash: 1628b36fe1eeb20d470e67bc4b7b69b220eec050dcf40fb335ee9ca24f967d24
                                                          • Instruction Fuzzy Hash: A9C13330A5C34CAADA3557E7CF09BB67A30AB61770F4C0A56F756CA0F3D7259C089622

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00403B68
                                                          • IsDebuggerPresent.KERNEL32 ref: 00403B7A
                                                          • GetFullPathNameW.KERNEL32(00007FFF,?,?,004C52F8,004C52E0,?,?), ref: 00403BEB
                                                            • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                            • Part of subcall function 0041092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00403C14,004C52F8,?,?,?), ref: 0041096E
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00403C6F
                                                          • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,004B7770,00000010), ref: 0043D281
                                                          • SetCurrentDirectoryW.KERNEL32(?,004C52F8,?,?,?), ref: 0043D2B9
                                                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,004B4260,004C52F8,?,?,?), ref: 0043D33F
                                                          • ShellExecuteW.SHELL32(00000000,?,?), ref: 0043D346
                                                            • Part of subcall function 00403A46: GetSysColorBrush.USER32(0000000F), ref: 00403A50
                                                            • Part of subcall function 00403A46: LoadCursorW.USER32(00000000,00007F00), ref: 00403A5F
                                                            • Part of subcall function 00403A46: LoadIconW.USER32(00000063), ref: 00403A76
                                                            • Part of subcall function 00403A46: LoadIconW.USER32(000000A4), ref: 00403A88
                                                            • Part of subcall function 00403A46: LoadIconW.USER32(000000A2), ref: 00403A9A
                                                            • Part of subcall function 00403A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00403AC0
                                                            • Part of subcall function 00403A46: RegisterClassExW.USER32(?), ref: 00403B16
                                                            • Part of subcall function 004039D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00403A03
                                                            • Part of subcall function 004039D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00403A24
                                                            • Part of subcall function 004039D5: ShowWindow.USER32(00000000,?,?), ref: 00403A38
                                                            • Part of subcall function 004039D5: ShowWindow.USER32(00000000,?,?), ref: 00403A41
                                                            • Part of subcall function 0040434A: _memset.LIBCMT ref: 00404370
                                                            • Part of subcall function 0040434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00404415
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                          • String ID: This is a third-party compiled AutoIt script.$runas$%I
                                                          • API String ID: 529118366-2806069697
                                                          • Opcode ID: 255f10e69cc8df1980d2df773c135a78c85689e8f31627855df614f078967646
                                                          • Instruction ID: 3b6422646bc5bb7d448bfeb78fc2b200dbb07c6b17ab8a28721e135d33d4e7f3
                                                          • Opcode Fuzzy Hash: 255f10e69cc8df1980d2df773c135a78c85689e8f31627855df614f078967646
                                                          • Instruction Fuzzy Hash: 8D519275D08108AADB01AFB5EC05EEE7BB8AB45745B1040BFF811B21E1DA786685CB2D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2085 4049a0-404a00 call 407667 GetVersionExW call 407bcc 2090 404a06 2085->2090 2091 404b0b-404b0d 2085->2091 2093 404a09-404a0e 2090->2093 2092 43d767-43d773 2091->2092 2094 43d774-43d778 2092->2094 2095 404b12-404b13 2093->2095 2096 404a14 2093->2096 2098 43d77b-43d787 2094->2098 2099 43d77a 2094->2099 2097 404a15-404a4c call 407d2c call 407726 2095->2097 2096->2097 2107 404a52-404a53 2097->2107 2108 43d864-43d867 2097->2108 2098->2094 2101 43d789-43d78e 2098->2101 2099->2098 2101->2093 2103 43d794-43d79b 2101->2103 2103->2092 2105 43d79d 2103->2105 2109 43d7a2-43d7a5 2105->2109 2107->2109 2110 404a59-404a64 2107->2110 2111 43d880-43d884 2108->2111 2112 43d869 2108->2112 2113 404a93-404aaa GetCurrentProcess IsWow64Process 2109->2113 2114 43d7ab-43d7c9 2109->2114 2115 43d7ea-43d7f0 2110->2115 2116 404a6a-404a6c 2110->2116 2119 43d886-43d88f 2111->2119 2120 43d86f-43d878 2111->2120 2117 43d86c 2112->2117 2121 404aac 2113->2121 2122 404aaf-404ac0 2113->2122 2114->2113 2118 43d7cf-43d7d5 2114->2118 2127 43d7f2-43d7f5 2115->2127 2128 43d7fa-43d800 2115->2128 2123 404a72-404a75 2116->2123 2124 43d805-43d811 2116->2124 2117->2120 2125 43d7d7-43d7da 2118->2125 2126 43d7df-43d7e5 2118->2126 2119->2117 2129 43d891-43d894 2119->2129 2120->2111 2121->2122 2130 404ac2-404ad2 call 404b37 2122->2130 2131 404b2b-404b35 GetSystemInfo 2122->2131 2132 43d831-43d834 2123->2132 2133 404a7b-404a8a 2123->2133 2135 43d813-43d816 2124->2135 2136 43d81b-43d821 2124->2136 2125->2113 2126->2113 2127->2113 2128->2113 2129->2120 2144 404ad4-404ae1 call 404b37 2130->2144 2145 404b1f-404b29 GetSystemInfo 2130->2145 2134 404af8-404b08 2131->2134 2132->2113 2141 43d83a-43d84f 2132->2141 2138 404a90 2133->2138 2139 43d826-43d82c 2133->2139 2135->2113 2136->2113 2138->2113 2139->2113 2142 43d851-43d854 2141->2142 2143 43d859-43d85f 2141->2143 2142->2113 2143->2113 2150 404ae3-404ae7 GetNativeSystemInfo 2144->2150 2151 404b18-404b1d 2144->2151 2146 404ae9-404aed 2145->2146 2146->2134 2149 404aef-404af2 FreeLibrary 2146->2149 2149->2134 2150->2146 2151->2150
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 004049CD
                                                            • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                          • GetCurrentProcess.KERNEL32(?,0048FAEC,00000000,00000000,?), ref: 00404A9A
                                                          • IsWow64Process.KERNEL32(00000000), ref: 00404AA1
                                                          • GetNativeSystemInfo.KERNEL32(00000000), ref: 00404AE7
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00404AF2
                                                          • GetSystemInfo.KERNEL32(00000000), ref: 00404B23
                                                          • GetSystemInfo.KERNEL32(00000000), ref: 00404B2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                          • String ID:
                                                          • API String ID: 1986165174-0
                                                          • Opcode ID: b374ae1e67c8a6c2b1dbeda5d6e5ff35506d62aec5490ffb1568074e7c13b988
                                                          • Instruction ID: 9368d54b81b13d28e750e9b7a77ce7499fab44d9898740901c219fded0589530
                                                          • Opcode Fuzzy Hash: b374ae1e67c8a6c2b1dbeda5d6e5ff35506d62aec5490ffb1568074e7c13b988
                                                          • Instruction Fuzzy Hash: 7A91A4719897C0DACB21DBA894501ABBFF5AF69300F444D6FD1C6A3B41D238B908C76E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2152 404e89-404ea1 CreateStreamOnHGlobal 2153 404ec1-404ec6 2152->2153 2154 404ea3-404eba FindResourceExW 2152->2154 2155 43d933-43d942 LoadResource 2154->2155 2156 404ec0 2154->2156 2155->2156 2157 43d948-43d956 SizeofResource 2155->2157 2156->2153 2157->2156 2158 43d95c-43d967 LockResource 2157->2158 2158->2156 2159 43d96d-43d98b 2158->2159 2159->2156
                                                          APIs
                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00404D8E,?,?,00000000,00000000), ref: 00404E99
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00404D8E,?,?,00000000,00000000), ref: 00404EB0
                                                          • LoadResource.KERNEL32(?,00000000,?,?,00404D8E,?,?,00000000,00000000,?,?,?,?,?,?,00404E2F), ref: 0043D937
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,00404D8E,?,?,00000000,00000000,?,?,?,?,?,?,00404E2F), ref: 0043D94C
                                                          • LockResource.KERNEL32(00404D8E,?,?,00404D8E,?,?,00000000,00000000,?,?,?,?,?,?,00404E2F,00000000), ref: 0043D95F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: 41d1929798edb895ac9d7ecac736fa75257a1a0119b35b9f9055d793dd554d7f
                                                          • Instruction ID: 68981a4d98a1b9f26aaf18e99fd77eadcf83d6f3c297b7fdd3b7e429ee84fbe5
                                                          • Opcode Fuzzy Hash: 41d1929798edb895ac9d7ecac736fa75257a1a0119b35b9f9055d793dd554d7f
                                                          • Instruction Fuzzy Hash: 59119EB0200300BFD7208B65EC48F2B7BBAFBC9B11F20467DF505D62A0DB71E8058665
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: pbL$%I
                                                          • API String ID: 3964851224-1578263234
                                                          • Opcode ID: 5321aa7f729078112e1a8cb17c6e91a84e62c12b251cb334e246fbbf78442dc2
                                                          • Instruction ID: 7d186bf48a599790b4ae94b3728c2257f551fe3f353e5d611b392294ecc69107
                                                          • Opcode Fuzzy Hash: 5321aa7f729078112e1a8cb17c6e91a84e62c12b251cb334e246fbbf78442dc2
                                                          • Instruction Fuzzy Hash: C8927D706043419FD720DF15C480B6BB7E1BF89304F14896EE8999B392D779EC85CB9A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: DdL$DdL$DdL$DdL$Variable must be of type 'Object'.
                                                          • API String ID: 0-2838938394
                                                          • Opcode ID: 216d59986b7a2487fa6f354ae55519cfe1a1ed330bd6ff28f20c9bafdc192041
                                                          • Instruction ID: 023dab180a9d3d77a7e8607c3136a2e1727c845c037ec0be429657ea2820e701
                                                          • Opcode Fuzzy Hash: 216d59986b7a2487fa6f354ae55519cfe1a1ed330bd6ff28f20c9bafdc192041
                                                          • Instruction Fuzzy Hash: C3A29E75A00205CFDB24CF56C480AAAB7B1FF58314F24887BE905AB391D739ED52CB99
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,0043E398), ref: 0046446A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0046447B
                                                          • FindClose.KERNEL32(00000000), ref: 0046448B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirst
                                                          • String ID:
                                                          • API String ID: 48322524-0
                                                          • Opcode ID: 4840215ffa09c9e98f8c71f503fabca7b99ef5557041bbbf62c8821922d9d811
                                                          • Instruction ID: 0270b6235cd3a211ff5fd07bbdee7491b27fcb3ec88e67c823a813e2b68c3cf0
                                                          • Opcode Fuzzy Hash: 4840215ffa09c9e98f8c71f503fabca7b99ef5557041bbbf62c8821922d9d811
                                                          • Instruction Fuzzy Hash: 54E0D8328105006B4610AB78EC0E4EE775C9E85335F100B6AFC35C11D0FB789904969F
                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00410A5B
                                                          • timeGetTime.WINMM ref: 00410D16
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00410E53
                                                          • Sleep.KERNEL32(0000000A), ref: 00410E61
                                                          • LockWindowUpdate.USER32(00000000,?,?), ref: 00410EFA
                                                          • DestroyWindow.USER32 ref: 00410F06
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00410F20
                                                          • Sleep.KERNEL32(0000000A,?,?), ref: 00444E83
                                                          • TranslateMessage.USER32(?), ref: 00445C60
                                                          • DispatchMessageW.USER32(?), ref: 00445C6E
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00445C82
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                          • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pbL$pbL$pbL$pbL
                                                          • API String ID: 4212290369-1082885916
                                                          • Opcode ID: 5cd4ae3c9f6798d911215eb667310f40c9432597e2690efffbf37d820f254686
                                                          • Instruction ID: d38973a2ad724f636fdb88fa2895c4b9f48f3c0ad1428ec49bcc8c13362f202a
                                                          • Opcode Fuzzy Hash: 5cd4ae3c9f6798d911215eb667310f40c9432597e2690efffbf37d820f254686
                                                          • Instruction Fuzzy Hash: BBB29470608741DFEB24DF24C445BABB7E4BF84304F14492FE54997292D779E885CB8A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1408264425.0000000000AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ErrorFreeLast
                                                          • String ID:
                                                          • API String ID: 1762890227-0
                                                          • Opcode ID: 1925c0039ca89a92d4e05405478181261c453e02d1e22d2a5e9407addf08681f
                                                          • Instruction ID: 50d86d38a1dcc410abc1380822126ca8dfcdbf6b8ad31de65965120bd54566d2
                                                          • Opcode Fuzzy Hash: 1925c0039ca89a92d4e05405478181261c453e02d1e22d2a5e9407addf08681f
                                                          • Instruction Fuzzy Hash: F1F1292190D34D6EDB3647E88C0977A2AA06F62770F9C0786F791CA1F2DE6C9C05D226

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1129 469155-469205 call 431940 call 420db6 call 40522e call 468f5f call 404ee5 call 42354c 1142 46920b-469212 call 469734 1129->1142 1143 4692b8-4692bf call 469734 1129->1143 1148 4692c1-4692c3 1142->1148 1149 469218-4692b6 call 4240fb call 422dbc call 422d8d call 4240fb call 422d8d * 2 1142->1149 1143->1148 1150 4692c8 1143->1150 1151 46952a-46952b 1148->1151 1153 4692cb-469387 call 404f0b * 8 call 4698e3 call 42525b 1149->1153 1150->1153 1154 469548-469558 call 405211 1151->1154 1188 469390-4693ab call 468fa5 1153->1188 1189 469389-46938b 1153->1189 1192 4693b1-4693b9 1188->1192 1193 46943d-469449 call 4253a6 1188->1193 1189->1151 1194 4693c1 1192->1194 1195 4693bb-4693bf 1192->1195 1200 46945f-469463 1193->1200 1201 46944b-46945a DeleteFileW 1193->1201 1197 4693c6-4693e4 call 404f0b 1194->1197 1195->1197 1205 4693e6-4693eb 1197->1205 1206 46940e-469424 call 468953 call 424863 1197->1206 1203 469505-469519 CopyFileW 1200->1203 1204 469469-4694f2 call 4240bb call 4699ea call 468b06 1200->1204 1201->1151 1208 46952d-469543 DeleteFileW call 4698a2 1203->1208 1209 46951b-469528 DeleteFileW 1203->1209 1204->1208 1225 4694f4-469503 DeleteFileW 1204->1225 1211 4693ee-469401 call 4690dd 1205->1211 1222 469429-469434 1206->1222 1208->1154 1209->1151 1220 469403-46940c 1211->1220 1220->1206 1222->1192 1223 46943a 1222->1223 1223->1193 1225->1151
                                                          APIs
                                                            • Part of subcall function 00468F5F: __time64.LIBCMT ref: 00468F69
                                                            • Part of subcall function 00404EE5: _fseek.LIBCMT ref: 00404EFD
                                                          • __wsplitpath.LIBCMT ref: 00469234
                                                            • Part of subcall function 004240FB: __wsplitpath_helper.LIBCMT ref: 0042413B
                                                          • _wcscpy.LIBCMT ref: 00469247
                                                          • _wcscat.LIBCMT ref: 0046925A
                                                          • __wsplitpath.LIBCMT ref: 0046927F
                                                          • _wcscat.LIBCMT ref: 00469295
                                                          • _wcscat.LIBCMT ref: 004692A8
                                                            • Part of subcall function 00468FA5: _memmove.LIBCMT ref: 00468FDE
                                                            • Part of subcall function 00468FA5: _memmove.LIBCMT ref: 00468FED
                                                          • _wcscmp.LIBCMT ref: 004691EF
                                                            • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469824
                                                            • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469837
                                                          • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00469452
                                                          • _wcsncpy.LIBCMT ref: 004694C5
                                                          • DeleteFileW.KERNEL32(?,?), ref: 004694FB
                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00469511
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00469522
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00469534
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                          • String ID:
                                                          • API String ID: 1500180987-0
                                                          • Opcode ID: 7c8db0594681c6f417e1ac50839a222e05dbd96a0456b52a488688be3988f024
                                                          • Instruction ID: 02a21988af13e7247216c1d96107bbd8e14577c6ac0cce12fd44c5267f831f24
                                                          • Opcode Fuzzy Hash: 7c8db0594681c6f417e1ac50839a222e05dbd96a0456b52a488688be3988f024
                                                          • Instruction Fuzzy Hash: 22C13DB1900129AADF11DF95CC81ADEB7BCEF85314F0040ABF609E6251EB749E858F69

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00403074
                                                          • RegisterClassExW.USER32(00000030), ref: 0040309E
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004030AF
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 004030CC
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004030DC
                                                          • LoadIconW.USER32(000000A9), ref: 004030F2
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00403101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: 8f69357ad4fd7de76c78bba9f685936345070209800999283baa0b23664e753e
                                                          • Instruction ID: 4440f0663549e4d62e3da2fdffcae7bb40582d53fb7b12173dce245a48cd956c
                                                          • Opcode Fuzzy Hash: 8f69357ad4fd7de76c78bba9f685936345070209800999283baa0b23664e753e
                                                          • Instruction Fuzzy Hash: 5F317A71801348AFDB50DFA4DC84A9DBFF0FB09310F24456EE480E62A0D7B91599CF69

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00403074
                                                          • RegisterClassExW.USER32(00000030), ref: 0040309E
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004030AF
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 004030CC
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004030DC
                                                          • LoadIconW.USER32(000000A9), ref: 004030F2
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00403101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: 1851e2fbc18e2f99d75288993840a6d640a6fda4d586a764550e5d38fc6b7f12
                                                          • Instruction ID: 5f72cbcfe52bedf9aac6cae92f5874e6cc1455117f94183018d2e1bba946cea4
                                                          • Opcode Fuzzy Hash: 1851e2fbc18e2f99d75288993840a6d640a6fda4d586a764550e5d38fc6b7f12
                                                          • Instruction Fuzzy Hash: DD21F9B1911208AFEB40EF94EC48B9DBBF4FB08700F10453AF511A62A0D7B555948FA9

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1295 40708b-4071b0 call 431940 call 407667 call 404706 call 42050b call 407cab call 403f74 call 407667 call 407d8c RegOpenKeyExW 1312 43e8b1-43e8cc RegQueryValueExW 1295->1312 1313 4071b6-4071d3 call 405904 * 2 1295->1313 1315 43e943-43e94f RegCloseKey 1312->1315 1316 43e8ce-43e90d call 420db6 call 40522e RegQueryValueExW 1312->1316 1315->1313 1318 43e955-43e959 1315->1318 1329 43e92b-43e931 1316->1329 1330 43e90f-43e929 call 407bcc 1316->1330 1321 43e95e-43e984 call 4079f2 * 2 1318->1321 1336 43e986-43e994 call 4079f2 1321->1336 1337 43e9a9-43e9b6 call 422bfc 1321->1337 1331 43e933-43e940 call 420e2c * 2 1329->1331 1332 43e941 1329->1332 1330->1329 1331->1332 1332->1315 1336->1337 1345 43e996-43e9a7 call 422d8d 1336->1345 1347 43e9b8-43e9c9 call 422bfc 1337->1347 1348 43e9dc-43ea16 call 407de1 call 403f74 call 405904 call 4079f2 1337->1348 1355 43ea1c-43ea1d 1345->1355 1347->1348 1356 43e9cb-43e9db call 422d8d 1347->1356 1348->1313 1348->1355 1355->1321 1356->1348
                                                          APIs
                                                            • Part of subcall function 00404706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,004C52F8,?,004037AE,?), ref: 00404724
                                                            • Part of subcall function 0042050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00407165), ref: 0042052D
                                                          • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 004071A8
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0043E8C8
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0043E909
                                                          • RegCloseKey.ADVAPI32(?), ref: 0043E947
                                                          • _wcscat.LIBCMT ref: 0043E9A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 2673923337-2727554177
                                                          • Opcode ID: 0bd69d56175447a29ebb382315097688d47d2fce8c852b44038c254da5b7497a
                                                          • Instruction ID: d25a402f486e77f999364444344266e14871576642d40cf04fb282302ec68e46
                                                          • Opcode Fuzzy Hash: 0bd69d56175447a29ebb382315097688d47d2fce8c852b44038c254da5b7497a
                                                          • Instruction Fuzzy Hash: E9718E71509301AEC340EF26E841D5BBBE8FF88314F51893FF445972A1DB79A948CB5A

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1365 403633-403681 1367 4036e1-4036e3 1365->1367 1368 403683-403686 1365->1368 1367->1368 1371 4036e5 1367->1371 1369 4036e7 1368->1369 1370 403688-40368f 1368->1370 1375 4036ed-4036f0 1369->1375 1376 43d0cc-43d0fa call 411070 call 411093 1369->1376 1372 403695-40369a 1370->1372 1373 40374b-403753 PostQuitMessage 1370->1373 1374 4036ca-4036d2 DefWindowProcW 1371->1374 1380 4036a0-4036a2 1372->1380 1381 43d154-43d168 call 462527 1372->1381 1382 403711-403713 1373->1382 1383 4036d8-4036de 1374->1383 1377 4036f2-4036f3 1375->1377 1378 403715-40373c SetTimer RegisterWindowMessageW 1375->1378 1411 43d0ff-43d106 1376->1411 1384 4036f9-40370c KillTimer call 40443a call 403114 1377->1384 1385 43d06f-43d072 1377->1385 1378->1382 1387 40373e-403749 CreatePopupMenu 1378->1387 1388 403755-40375f call 4044a0 1380->1388 1389 4036a8-4036ad 1380->1389 1381->1382 1404 43d16e 1381->1404 1382->1383 1384->1382 1397 43d074-43d076 1385->1397 1398 43d0a8-43d0c7 MoveWindow 1385->1398 1387->1382 1405 403764 1388->1405 1393 4036b3-4036b8 1389->1393 1394 43d139-43d140 1389->1394 1402 43d124-43d134 call 462d36 1393->1402 1403 4036be-4036c4 1393->1403 1394->1374 1400 43d146-43d14f call 457c36 1394->1400 1406 43d097-43d0a3 SetFocus 1397->1406 1407 43d078-43d07b 1397->1407 1398->1382 1400->1374 1402->1382 1403->1374 1403->1411 1404->1374 1405->1382 1406->1382 1407->1403 1412 43d081-43d092 call 411070 1407->1412 1411->1374 1416 43d10c-43d11f call 40443a call 40434a 1411->1416 1412->1382 1416->1374
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?), ref: 004036D2
                                                          • KillTimer.USER32(?,00000001), ref: 004036FC
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0040371F
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0040372A
                                                          • CreatePopupMenu.USER32 ref: 0040373E
                                                          • PostQuitMessage.USER32(00000000), ref: 0040374D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated$%I
                                                          • API String ID: 129472671-1195164674
                                                          • Opcode ID: d085891fbce4ac700e19f77706549dbb7e8c65c9ecaa69f5eff41dbd37e5b37c
                                                          • Instruction ID: dec945db719cbeb7d7ffc5e313a4f07f26295059660cff28048481092df75402
                                                          • Opcode Fuzzy Hash: d085891fbce4ac700e19f77706549dbb7e8c65c9ecaa69f5eff41dbd37e5b37c
                                                          • Instruction Fuzzy Hash: F34127B1110505ABDB246F68EC09F7E3E98EB44302F50453BF602A63E1C67EAD95972E

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00403A50
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00403A5F
                                                          • LoadIconW.USER32(00000063), ref: 00403A76
                                                          • LoadIconW.USER32(000000A4), ref: 00403A88
                                                          • LoadIconW.USER32(000000A2), ref: 00403A9A
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00403AC0
                                                          • RegisterClassExW.USER32(?), ref: 00403B16
                                                            • Part of subcall function 00403041: GetSysColorBrush.USER32(0000000F), ref: 00403074
                                                            • Part of subcall function 00403041: RegisterClassExW.USER32(00000030), ref: 0040309E
                                                            • Part of subcall function 00403041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004030AF
                                                            • Part of subcall function 00403041: InitCommonControlsEx.COMCTL32(?), ref: 004030CC
                                                            • Part of subcall function 00403041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004030DC
                                                            • Part of subcall function 00403041: LoadIconW.USER32(000000A9), ref: 004030F2
                                                            • Part of subcall function 00403041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00403101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: e93e5f7a6ad55884e62165224cde73996e1a183fbeab7dcf433d053beda00650
                                                          • Instruction ID: 95199bfa57b98a40bbf2a31e3c8143aaf86e5cd3d1ec7ed5ae4cf298cf618104
                                                          • Opcode Fuzzy Hash: e93e5f7a6ad55884e62165224cde73996e1a183fbeab7dcf433d053beda00650
                                                          • Instruction Fuzzy Hash: C4214874D00308AFEB50DFA4EC09F9D7BF4FB08711F1045BAE500A62A1D3B966948F88
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1408264425.0000000000AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 311230be48adb5367ad716dbdf4c5b8017d1cf17239e38096d4b6c40087f10fb
                                                          • Instruction ID: a08d02b963e2047860f6a9b1837983c4389cf99dd1a2f50975e91a3ec4d64ecf
                                                          • Opcode Fuzzy Hash: 311230be48adb5367ad716dbdf4c5b8017d1cf17239e38096d4b6c40087f10fb
                                                          • Instruction Fuzzy Hash: 54A2BE7150D3818FC735CB18C8447AABBE1AFD5328F498A5FE09A97392D735A904CB93

                                                          Control-flow Graph

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                          • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$RL
                                                          • API String ID: 1825951767-3937808951
                                                          • Opcode ID: bf729bc036ab1e3317ed16226f5a6ba2ab3dbb3ff9daeb18d2562a5e898344aa
                                                          • Instruction ID: 217e4a9907ead401ca9bb1711b2953d037e75f133ca24ff269f2dfb0051b1760
                                                          • Opcode Fuzzy Hash: bf729bc036ab1e3317ed16226f5a6ba2ab3dbb3ff9daeb18d2562a5e898344aa
                                                          • Instruction Fuzzy Hash: DAA13CB29102199ACB04EFA1DC91EEEBB78BF14314F40053FE415B7191DB786A08CBA9

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00420162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00420193
                                                            • Part of subcall function 00420162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0042019B
                                                            • Part of subcall function 00420162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 004201A6
                                                            • Part of subcall function 00420162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 004201B1
                                                            • Part of subcall function 00420162: MapVirtualKeyW.USER32(00000011,00000000), ref: 004201B9
                                                            • Part of subcall function 00420162: MapVirtualKeyW.USER32(00000012,00000000), ref: 004201C1
                                                            • Part of subcall function 004160F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0040F930), ref: 00416154
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0040F9CD
                                                          • OleInitialize.OLE32(00000000), ref: 0040FA4A
                                                          • CloseHandle.KERNEL32(00000000), ref: 004445C8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID: <WL$\TL$%I$SL
                                                          • API String ID: 1986988660-4199584472
                                                          • Opcode ID: 66b0d841d80f60ddd55c2de4cf445b91ea5cd604cc27ef35133c2a6073eab96b
                                                          • Instruction ID: cacde0f204b6a9090d7281a683cdea215049a4593ae0d5a2ec8f4d386ae10ecf
                                                          • Opcode Fuzzy Hash: 66b0d841d80f60ddd55c2de4cf445b91ea5cd604cc27ef35133c2a6073eab96b
                                                          • Instruction Fuzzy Hash: 6581ADB4901A809EC3C8EF3AA944F5D7BE5AB9830A790853F9419C7272E77874C58F1D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2031 e87dd0-e87e7e call e857e0 2034 e87e85-e87eab call e88ce0 CreateFileW 2031->2034 2037 e87ead 2034->2037 2038 e87eb2-e87ec2 2034->2038 2039 e87ffd-e88001 2037->2039 2045 e87ec9-e87ee3 VirtualAlloc 2038->2045 2046 e87ec4 2038->2046 2040 e88043-e88046 2039->2040 2041 e88003-e88007 2039->2041 2047 e88049-e88050 2040->2047 2043 e88009-e8800c 2041->2043 2044 e88013-e88017 2041->2044 2043->2044 2050 e88019-e88023 2044->2050 2051 e88027-e8802b 2044->2051 2052 e87eea-e87f01 ReadFile 2045->2052 2053 e87ee5 2045->2053 2046->2039 2048 e88052-e8805d 2047->2048 2049 e880a5-e880ba 2047->2049 2054 e8805f 2048->2054 2055 e88061-e8806d 2048->2055 2056 e880ca-e880d2 2049->2056 2057 e880bc-e880c7 VirtualFree 2049->2057 2050->2051 2058 e8803b 2051->2058 2059 e8802d-e88037 2051->2059 2060 e87f08-e87f48 VirtualAlloc 2052->2060 2061 e87f03 2052->2061 2053->2039 2054->2049 2064 e8806f-e8807f 2055->2064 2065 e88081-e8808d 2055->2065 2057->2056 2058->2040 2059->2058 2062 e87f4a 2060->2062 2063 e87f4f-e87f6a call e88f30 2060->2063 2061->2039 2062->2039 2071 e87f75-e87f7f 2063->2071 2067 e880a3 2064->2067 2068 e8809a-e880a0 2065->2068 2069 e8808f-e88098 2065->2069 2067->2047 2068->2067 2069->2067 2072 e87f81-e87fb0 call e88f30 2071->2072 2073 e87fb2-e87fc6 call e88d40 2071->2073 2072->2071 2079 e87fc8 2073->2079 2080 e87fca-e87fce 2073->2080 2079->2039 2081 e87fda-e87fde 2080->2081 2082 e87fd0-e87fd4 CloseHandle 2080->2082 2083 e87fee-e87ff7 2081->2083 2084 e87fe0-e87feb VirtualFree 2081->2084 2082->2081 2083->2034 2083->2039 2084->2083
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00E87EA1
                                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00E880C7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1409377799.0000000000E85000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E85000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e85000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CreateFileFreeVirtual
                                                          • String ID:
                                                          • API String ID: 204039940-0
                                                          • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                                          • Instruction ID: 502e0b6f2724db1d4146de2f10edcf8a0acf9a26015b7e4b88f099e8cf2929b4
                                                          • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                                          • Instruction Fuzzy Hash: 8DA11970E04209EBEB14DFA4C994BEEB7B5FF48304F209159E609BB280DB759E84DB54

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2162 4039d5-403a45 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00403A03
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00403A24
                                                          • ShowWindow.USER32(00000000,?,?), ref: 00403A38
                                                          • ShowWindow.USER32(00000000,?,?), ref: 00403A41
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: 63781ed4ae1f3443bb25091dad28ecbd1b84819009c2b11518bfb31f136976a9
                                                          • Instruction ID: be7595edf0713681b26590b93805f6b8ae52c85786ba9eb407d90bea5093dcab
                                                          • Opcode Fuzzy Hash: 63781ed4ae1f3443bb25091dad28ecbd1b84819009c2b11518bfb31f136976a9
                                                          • Instruction Fuzzy Hash: 5DF03A705002907EEB705723AC48E2F2EBDD7C6F50B00407EB900E2170C2752881CEB8

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2515 e87b90-e87cc7 call e857e0 call e87a80 CreateFileW 2522 e87cc9 2515->2522 2523 e87cce-e87cde 2515->2523 2524 e87d7e-e87d83 2522->2524 2526 e87ce0 2523->2526 2527 e87ce5-e87cff VirtualAlloc 2523->2527 2526->2524 2528 e87d01 2527->2528 2529 e87d03-e87d1a ReadFile 2527->2529 2528->2524 2530 e87d1c 2529->2530 2531 e87d1e-e87d58 call e87ac0 call e86a80 2529->2531 2530->2524 2536 e87d5a-e87d6f call e87b10 2531->2536 2537 e87d74-e87d7c ExitProcess 2531->2537 2536->2537 2537->2524
                                                          APIs
                                                            • Part of subcall function 00E87A80: Sleep.KERNEL32(000001F4), ref: 00E87A91
                                                          • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00E87CBD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1409377799.0000000000E85000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E85000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e85000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CreateFileSleep
                                                          • String ID: 0TOG5A2EM2N0AXUC3H8
                                                          • API String ID: 2694422964-2068012696
                                                          • Opcode ID: 82cd89d1499e69f08d99ebea5eaed76e4a3dda64ac53d4e0330c7f6662434e40
                                                          • Instruction ID: d5eb37abebdda1e289e8bbeb86c17a62bd119fa7a78ff74c23dd6f976f3aec5e
                                                          • Opcode Fuzzy Hash: 82cd89d1499e69f08d99ebea5eaed76e4a3dda64ac53d4e0330c7f6662434e40
                                                          • Instruction Fuzzy Hash: 7A51A170D08248EAEF11DBF4C814BEEBBB9AF15304F104199E64CBB2C1D6B94B44CBA5

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2539 40407c-404092 2540 404098-4040ad call 407a16 2539->2540 2541 40416f-404173 2539->2541 2544 4040b3-4040d3 call 407bcc 2540->2544 2545 43d3c8-43d3d7 LoadStringW 2540->2545 2548 43d3e2-43d3fa call 407b2e call 406fe3 2544->2548 2549 4040d9-4040dd 2544->2549 2545->2548 2558 4040ed-40416a call 422de0 call 40454e call 422dbc Shell_NotifyIconW call 405904 2548->2558 2561 43d400-43d41e call 407cab call 406fe3 call 407cab 2548->2561 2551 4040e3-4040e8 call 407b2e 2549->2551 2552 404174-40417d call 408047 2549->2552 2551->2558 2552->2558 2558->2541 2561->2558
                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0043D3D7
                                                            • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                          • _memset.LIBCMT ref: 004040FC
                                                          • _wcscpy.LIBCMT ref: 00404150
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00404160
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                          • String ID: Line:
                                                          • API String ID: 3942752672-1585850449
                                                          • Opcode ID: d21009a627d630a93433c35e80ef480998eb63dd03275a386dfb8ac04053bcd4
                                                          • Instruction ID: 5bc5e1414a994c2bc470de53771d73d2d6dd5f3f474fa0ef1b1349c24bbf7672
                                                          • Opcode Fuzzy Hash: d21009a627d630a93433c35e80ef480998eb63dd03275a386dfb8ac04053bcd4
                                                          • Instruction Fuzzy Hash: 0C31A0B1408305AAD360EB61DC45FDF77E8AB84308F10493FB685A21D1DB78A649CB9F
                                                          APIs
                                                          • CreateProcessW.KERNEL32(?,00000000), ref: 00E8723B
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E872D1
                                                          • ReadProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00E872F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1409377799.0000000000E85000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E85000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e85000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: e3f14b9100784c2d13b4d96e4da997e342e741b63af52aad6d222721779d43e7
                                                          • Instruction ID: 4718fc0ba92822cb26208e4412dd50188986307385f7c104602f8c0257f35253
                                                          • Opcode Fuzzy Hash: e3f14b9100784c2d13b4d96e4da997e342e741b63af52aad6d222721779d43e7
                                                          • Instruction Fuzzy Hash: EB620B30A14658DBEB24DFA4C850BDEB372EF58304F2091A9D50DFB2A0E7759E81CB59
                                                          APIs
                                                            • Part of subcall function 00404DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404E0F
                                                          • _free.LIBCMT ref: 0043E263
                                                          • _free.LIBCMT ref: 0043E2AA
                                                            • Part of subcall function 00406A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00406BAD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _free$CurrentDirectoryLibraryLoad
                                                          • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                          • API String ID: 2861923089-1757145024
                                                          • Opcode ID: d76785ac015817b771e0c92402641700af4005d1542243439f3d4eb097ccf105
                                                          • Instruction ID: bc1048028433ed9b22f3ef3a1c1c6008be5ef254c57e4e777beaa03c5b85f979
                                                          • Opcode Fuzzy Hash: d76785ac015817b771e0c92402641700af4005d1542243439f3d4eb097ccf105
                                                          • Instruction Fuzzy Hash: 0D916E71901229AFCF04EFA6C8419EEB7B4FF08314F10446FE815AB2E1DB78A955CB59
                                                          APIs
                                                          • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,004035A1,SwapMouseButtons,00000004,?), ref: 004035D4
                                                          • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,004035A1,SwapMouseButtons,00000004,?,?,?,?,00402754), ref: 004035F5
                                                          • RegCloseKey.KERNEL32(00000000,?,?,004035A1,SwapMouseButtons,00000004,?,?,?,?,00402754), ref: 00403617
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: fddb709fe4a1b7e3bb6eda9662e0779279b58f522ad42de317fca39f37a0c6b5
                                                          • Instruction ID: b1ff216ba3ee978410a1c1c06e663b0c2c98cd46aaa17f39490786bf8a1b1252
                                                          • Opcode Fuzzy Hash: fddb709fe4a1b7e3bb6eda9662e0779279b58f522ad42de317fca39f37a0c6b5
                                                          • Instruction Fuzzy Hash: 84114871510208BFDB20CF64DC409AFBBBCEF45741F10486AE805E7250D6729E449768
                                                          APIs
                                                            • Part of subcall function 00404EE5: _fseek.LIBCMT ref: 00404EFD
                                                            • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469824
                                                            • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469837
                                                          • _free.LIBCMT ref: 004696A2
                                                          • _free.LIBCMT ref: 004696A9
                                                          • _free.LIBCMT ref: 00469714
                                                            • Part of subcall function 00422D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00429A24), ref: 00422D69
                                                            • Part of subcall function 00422D55: GetLastError.KERNEL32(00000000,?,00429A24), ref: 00422D7B
                                                          • _free.LIBCMT ref: 0046971C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                          • String ID:
                                                          • API String ID: 1552873950-0
                                                          • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                          • Instruction ID: ca2eec8eb8578c2366e6fbf42eaf411172dd757ca1b938988fe54b4571807f9b
                                                          • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                          • Instruction Fuzzy Hash: 88515EB1904219ABDF249F65DC81A9EBB79EF88304F1044AEF209A3241DB755E90CF59
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                          • String ID:
                                                          • API String ID: 2782032738-0
                                                          • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                          • Instruction ID: 7e2b6cc7ad03bd9c76499a1e37937a2f988b0f8539bc111f38111bac958280d8
                                                          • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                          • Instruction Fuzzy Hash: 9341D434B006659BDB189F69E88096F7BA5EFC2364B50813FE82587640DB78DD418B48
                                                          APIs
                                                          • SetFilePointerEx.KERNEL32 ref: 00ADB2BA
                                                          • WriteFile.KERNEL32(?,?,00000004,?,00000000), ref: 00ADB2E0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1408264425.0000000000AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: File$PointerWrite
                                                          • String ID:
                                                          • API String ID: 539440098-0
                                                          • Opcode ID: 798ae18b21d7488220b83a15ff29e0f047c6672e49b4271152b4a18f84283056
                                                          • Instruction ID: c9d395984e5d0f6384bee3bba2addae4e00478f43e14e9970d8a14477f651f23
                                                          • Opcode Fuzzy Hash: 798ae18b21d7488220b83a15ff29e0f047c6672e49b4271152b4a18f84283056
                                                          • Instruction Fuzzy Hash: BD318F7542C380EED7118B25881576FBFE06B92B14F8A854FE4968A791D3B4890897B3
                                                          APIs
                                                          • _memset.LIBCMT ref: 004044CF
                                                            • Part of subcall function 0040407C: _memset.LIBCMT ref: 004040FC
                                                            • Part of subcall function 0040407C: _wcscpy.LIBCMT ref: 00404150
                                                            • Part of subcall function 0040407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00404160
                                                          • KillTimer.USER32(?,00000001,?,?), ref: 00404524
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00404533
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0043D4B9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                          • String ID:
                                                          • API String ID: 1378193009-0
                                                          • Opcode ID: 8233c1c53fe49e8a502b553c2e8f55af8437e20015ea4a24a99bc4102d4ad802
                                                          • Instruction ID: dcb2c65cf3c1a774e1d203f737fabc32089307ed9affa8f53aec521d9447171b
                                                          • Opcode Fuzzy Hash: 8233c1c53fe49e8a502b553c2e8f55af8437e20015ea4a24a99bc4102d4ad802
                                                          • Instruction Fuzzy Hash: 6F21FBB0904754AFE7328B249C45BEBBBEC9B55318F0404AFE79A56281C3782984CB49
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: AU3!P/I$EA06
                                                          • API String ID: 4104443479-1914660620
                                                          • Opcode ID: a4a93ea115200c971a8861d8d6b54e97b5cb82f41a73f581a0e127d2f66012de
                                                          • Instruction ID: ff6ab1fe0fa27ea81cbcababf34b5742e04188ff143208347500ec0318cc5285
                                                          • Opcode Fuzzy Hash: a4a93ea115200c971a8861d8d6b54e97b5cb82f41a73f581a0e127d2f66012de
                                                          • Instruction Fuzzy Hash: F1418AB1A0415867DB219B6498517BF7BA19FC5304F28407BEE82BB3C2D63C5D4583AA
                                                          APIs
                                                          • _memset.LIBCMT ref: 0043EA39
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 0043EA83
                                                            • Part of subcall function 00404750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00404743,?,?,004037AE,?), ref: 00404770
                                                            • Part of subcall function 00420791: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 004207B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen_memset
                                                          • String ID: X
                                                          • API String ID: 3777226403-3081909835
                                                          • Opcode ID: f7a2dfced1c7fac4da1122c6cfde17308801e93c3a8658db5658365851755d62
                                                          • Instruction ID: baa1e7331fae4d359aac7897d23b5e8ce5a65ce190648e6f88e75d23560a4c0c
                                                          • Opcode Fuzzy Hash: f7a2dfced1c7fac4da1122c6cfde17308801e93c3a8658db5658365851755d62
                                                          • Instruction Fuzzy Hash: 4421A471A102589BCB41DF95D845BDE7BF8AF49314F00806FE508B7281DBB85989CFAA
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?), ref: 004698F8
                                                          • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 0046990F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: d3e801ab242beb6fec4b4f89e1aaff04be832202f3ef9fc21f6b566375e79959
                                                          • Instruction ID: d76eb4abf93f0e171a782776cb2de2514a1bc3ee8d101bd4a6c1c3d5b9ef8161
                                                          • Opcode Fuzzy Hash: d3e801ab242beb6fec4b4f89e1aaff04be832202f3ef9fc21f6b566375e79959
                                                          • Instruction Fuzzy Hash: D0D05E7954030DABDB50ABA0DC0EFDA773CE704700F0006F5BA54D10A1EAB1A5988BA9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e563156e91e36691d5f4fcac2aaf6be647dac8c86d34431775506fe1d7328f76
                                                          • Instruction ID: 208f182f3c9136cc863dec11eab3d0960db0a10b8073f2b3425ab1c058278d8f
                                                          • Opcode Fuzzy Hash: e563156e91e36691d5f4fcac2aaf6be647dac8c86d34431775506fe1d7328f76
                                                          • Instruction Fuzzy Hash: 8AF13A716083019FC714DF29C480A6ABBE5FF88318F54892EF8999B392D734E945CF86
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1408264425.0000000000AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ComputerName
                                                          • String ID:
                                                          • API String ID: 3545744682-0
                                                          • Opcode ID: 9af15faa8f017226f03fee95b7fceefc958e718ecb99ebfe56a682ec550d5c75
                                                          • Instruction ID: e522379a62e3fe69d754001e3cce092b84824a9968668cc8ebc60eb18c16818b
                                                          • Opcode Fuzzy Hash: 9af15faa8f017226f03fee95b7fceefc958e718ecb99ebfe56a682ec550d5c75
                                                          • Instruction Fuzzy Hash: 4821F53564D34C7BEA3657D49C0AFBD7A346F61750FC8448AF788561D2D6A83C088A63
                                                          APIs
                                                          • _memset.LIBCMT ref: 00404370
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00404415
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00404432
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$_memset
                                                          • String ID:
                                                          • API String ID: 1505330794-0
                                                          • Opcode ID: 55e578eaf81f1082cb721cb8179a93cbba9ea3621e04278649df261dfa9eaab8
                                                          • Instruction ID: 448a70bf35e4549ae47872dc9eb977fea889799f7ce089bf6dae1479d4278b9a
                                                          • Opcode Fuzzy Hash: 55e578eaf81f1082cb721cb8179a93cbba9ea3621e04278649df261dfa9eaab8
                                                          • Instruction Fuzzy Hash: 4E3184B05047019FD760DF24D884A9BBBF8FB98308F00093FEA9A92391D7746944CB5A
                                                          APIs
                                                          • __FF_MSGBANNER.LIBCMT ref: 00425733
                                                            • Part of subcall function 0042A16B: __NMSG_WRITE.LIBCMT ref: 0042A192
                                                            • Part of subcall function 0042A16B: __NMSG_WRITE.LIBCMT ref: 0042A19C
                                                          • __NMSG_WRITE.LIBCMT ref: 0042573A
                                                            • Part of subcall function 0042A1C8: GetModuleFileNameW.KERNEL32(00000000,004C33BA,00000104,00000000,00000001,00000000), ref: 0042A25A
                                                            • Part of subcall function 0042A1C8: ___crtMessageBoxW.LIBCMT ref: 0042A308
                                                            • Part of subcall function 0042309F: ___crtCorExitProcess.LIBCMT ref: 004230A5
                                                            • Part of subcall function 0042309F: ExitProcess.KERNEL32 ref: 004230AE
                                                            • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                                          • RtlAllocateHeap.NTDLL(00C10000,00000000,00000001,?,00000000,00000001,?,00420DD3,?,00000000,%I,?,00409E8C,?,?,?), ref: 0042575F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                          • String ID:
                                                          • API String ID: 1372826849-0
                                                          • Opcode ID: 173bc1eb0939af60788e3920f729a181213a4711687b08a62f5fb4dd74449d1b
                                                          • Instruction ID: 12628286b9c33790f0bcaf27d243d0f78d5a939af01e39ac9af769d2403f214a
                                                          • Opcode Fuzzy Hash: 173bc1eb0939af60788e3920f729a181213a4711687b08a62f5fb4dd74449d1b
                                                          • Instruction Fuzzy Hash: 8101D235380B31DADA102B36BC42A2E67588BC2766FD0043FF9059A281DE7C9D01866D
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00469548,?,?,?,?,?,00000004), ref: 004698BB
                                                          • SetFileTime.KERNEL32(00000000,?,00000000,?,?,00469548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 004698D1
                                                          • CloseHandle.KERNEL32(00000000,?,00469548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 004698D8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleTime
                                                          • String ID:
                                                          • API String ID: 3397143404-0
                                                          • Opcode ID: bd87c49bddbed0dd2230edd6d70eff61a4bb717c0cd42ce1b208173b53aacf55
                                                          • Instruction ID: c759ec0fed9c3a555ac5ec6521767d99e991bc38b38178bd45d0c2782cb34c4e
                                                          • Opcode Fuzzy Hash: bd87c49bddbed0dd2230edd6d70eff61a4bb717c0cd42ce1b208173b53aacf55
                                                          • Instruction Fuzzy Hash: 6EE08632140214B7D7212B54EC0DFDE7B19EB06760F144535FF14A90E087B12925979C
                                                          APIs
                                                          • _free.LIBCMT ref: 00468D1B
                                                            • Part of subcall function 00422D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00429A24), ref: 00422D69
                                                            • Part of subcall function 00422D55: GetLastError.KERNEL32(00000000,?,00429A24), ref: 00422D7B
                                                          • _free.LIBCMT ref: 00468D2C
                                                          • _free.LIBCMT ref: 00468D3E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                          • Instruction ID: 6b151060fb8ed88ed9ffdc5938a612973e117ec8253147f08314cae1c0c73c84
                                                          • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                          • Instruction Fuzzy Hash: 10E0C2B170171253CB20A579BA40A8313DC4F4C3967440A0FB40DD7282DEACF842803C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: CALL
                                                          • API String ID: 0-4196123274
                                                          • Opcode ID: dfc4b9bb6d3e75c830fec079ffbc95046ec1c120a3343fa91d00179885e2200b
                                                          • Instruction ID: c803bb07f2a617980fc862d1973d54e65b33ee20ceb4547c7cbfd92c67e19f3b
                                                          • Opcode Fuzzy Hash: dfc4b9bb6d3e75c830fec079ffbc95046ec1c120a3343fa91d00179885e2200b
                                                          • Instruction Fuzzy Hash: 8A225B70608301DFD724DF14C454A6AB7E1FF44308F15896EE98AAB3A2D739EC55CB8A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 3c6315685b18230a41db523489b843865efacec3c0a635d1b23e34ceb6c4029d
                                                          • Instruction ID: 665aeeeda7618be144ab26ba5ea9c3b14b1a5e971dff4faecb2a1d88e99e5761
                                                          • Opcode Fuzzy Hash: 3c6315685b18230a41db523489b843865efacec3c0a635d1b23e34ceb6c4029d
                                                          • Instruction Fuzzy Hash: 8841D7716082059BCB10FFA9D8859BAB7E8EF49308B64445FE14597382EF3D9C05CB6A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: aa52f996f6a1e8cebf2e93e85435818c4b1739226e09e342898e130c21d93d86
                                                          • Instruction ID: 2724e85abdc1188f3097b0ceee28e317ee468c7dcaf0b9eeda237b3ec1003ef0
                                                          • Opcode Fuzzy Hash: aa52f996f6a1e8cebf2e93e85435818c4b1739226e09e342898e130c21d93d86
                                                          • Instruction Fuzzy Hash: CB31C4B1B00506AFC704DF69D891E69B3A4FF48314715822AE519CB3D1EB38F911CB95
                                                          APIs
                                                          • CreateThread.KERNEL32(00000000,00000000,00AD55C0,?,00000000,00000000), ref: 00AD5A51
                                                          • RtlExitUserThread.NTDLL(00000000), ref: 00AD5B11
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1408264425.0000000000AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Thread$CreateExitUser
                                                          • String ID:
                                                          • API String ID: 4108186749-0
                                                          • Opcode ID: 82eccd49241ec15e7f3353b2222a813f913bdf892449e3740cb74b033c1e94aa
                                                          • Instruction ID: e19c72f40e5694fec33a0a61f3c657253ecf1662f2e379f344c33868cbc2d43c
                                                          • Opcode Fuzzy Hash: 82eccd49241ec15e7f3353b2222a813f913bdf892449e3740cb74b033c1e94aa
                                                          • Instruction Fuzzy Hash: E4110611D0DBC14ED72387788825766BFA01F63720F5906DBD0928E2E3D269490893A3
                                                          APIs
                                                          • IsThemeActive.UXTHEME ref: 00404834
                                                            • Part of subcall function 0042336C: __lock.LIBCMT ref: 00423372
                                                            • Part of subcall function 0042336C: DecodePointer.KERNEL32(00000001,?,00404849,00457C74), ref: 0042337E
                                                            • Part of subcall function 0042336C: EncodePointer.KERNEL32(?,?,00404849,00457C74), ref: 00423389
                                                            • Part of subcall function 004048FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00404915
                                                            • Part of subcall function 004048FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040492A
                                                            • Part of subcall function 00403B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00403B68
                                                            • Part of subcall function 00403B3A: IsDebuggerPresent.KERNEL32 ref: 00403B7A
                                                            • Part of subcall function 00403B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,004C52F8,004C52E0,?,?), ref: 00403BEB
                                                            • Part of subcall function 00403B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00403C6F
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00404874
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                          • String ID:
                                                          • API String ID: 1438897964-0
                                                          • Opcode ID: 13bbe0c74f5194e49c071aa5a0b14ab81aac5f2f5d26dabd82ae82306b4d1084
                                                          • Instruction ID: 9525eea27cfe2a06ee6bb0b94f8a439f0fec78f72a1223afaaa4f4cc7b3f6ca0
                                                          • Opcode Fuzzy Hash: 13bbe0c74f5194e49c071aa5a0b14ab81aac5f2f5d26dabd82ae82306b4d1084
                                                          • Instruction Fuzzy Hash: 96118E729143019BC700EF69E80591EBBE8EB95754F10893FF440932B2DB749A49CB9E
                                                          APIs
                                                            • Part of subcall function 0042571C: __FF_MSGBANNER.LIBCMT ref: 00425733
                                                            • Part of subcall function 0042571C: __NMSG_WRITE.LIBCMT ref: 0042573A
                                                            • Part of subcall function 0042571C: RtlAllocateHeap.NTDLL(00C10000,00000000,00000001,?,00000000,00000001,?,00420DD3,?,00000000,%I,?,00409E8C,?,?,?), ref: 0042575F
                                                          • std::exception::exception.LIBCMT ref: 00420DEC
                                                          • __CxxThrowException@8.LIBCMT ref: 00420E01
                                                            • Part of subcall function 0042859B: RaiseException.KERNEL32(?,?,00000000,004B9E78,?,00000001,?,?,?,00420E06,00000000,004B9E78,00409E8C,00000001), ref: 004285F0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 3902256705-0
                                                          • Opcode ID: a1c4870ae67c25cf443983c81cfea13b426b6c380140abe28f3bf244e2cf3b27
                                                          • Instruction ID: 7ce0db18d3e86308d2e94e4ef4c1f65fcbea9f9514d772724804ad69f7891851
                                                          • Opcode Fuzzy Hash: a1c4870ae67c25cf443983c81cfea13b426b6c380140abe28f3bf244e2cf3b27
                                                          • Instruction Fuzzy Hash: BAF0863560223976CB10BA95FD015DF7BE89F01315F90452FF90496282DFB89A8091DD
                                                          APIs
                                                            • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                                          • __lock_file.LIBCMT ref: 004253EB
                                                            • Part of subcall function 00426C11: __lock.LIBCMT ref: 00426C34
                                                          • __fclose_nolock.LIBCMT ref: 004253F6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                          • String ID:
                                                          • API String ID: 2800547568-0
                                                          • Opcode ID: 835793fb4b5a24fbea1eeed30733b59c67049ef9a82bceb899d9520eea3a16f0
                                                          • Instruction ID: fafcd99f2ade88ab86af259f2ce8aa17897398df1327fb2dd29172a4384519b5
                                                          • Opcode Fuzzy Hash: 835793fb4b5a24fbea1eeed30733b59c67049ef9a82bceb899d9520eea3a16f0
                                                          • Instruction Fuzzy Hash: 56F09C71B026249AD710BF66780579D66E06F41378FA1914FE814E71C1CFBC49419B5E
                                                          APIs
                                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00AD5D6D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1408264425.0000000000AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: FreeVirtual
                                                          • String ID:
                                                          • API String ID: 1263568516-0
                                                          • Opcode ID: d314d85811c41aed1a39602cb6ec7f125a9d288e3e9c3c75a3dfd5feb0a30391
                                                          • Instruction ID: e534568f7b820def0d4c38b5e9428db97e171b3409e8f486f2a4904a02de35f5
                                                          • Opcode Fuzzy Hash: d314d85811c41aed1a39602cb6ec7f125a9d288e3e9c3c75a3dfd5feb0a30391
                                                          • Instruction Fuzzy Hash: 40F09651D04F04B6DE7EC7B8E94DB713A536B12714F4C4147A6E31A3B286512C15C132
                                                          APIs
                                                          • CreateProcessW.KERNEL32(?,00000000), ref: 00E8723B
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E872D1
                                                          • ReadProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00E872F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1409377799.0000000000E85000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E85000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e85000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                                          • Instruction ID: ac377952d091df20719e1955624798068f8849cbbedc61ae579d11c71d338eb6
                                                          • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                                          • Instruction Fuzzy Hash: A312C024E18658C6EB24DF64D8507DEB232FF68300F1064E9910DEB7A5E77A4E81CF5A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1408264425.0000000000AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cf0c270326acc2c26989dcaec4525d53b4b8f6881fb9eb708be334755e47731e
                                                          • Instruction ID: e98b0593b37bd2c8b718377068efed41bca5f879dcc87f2db59819110c4fdf22
                                                          • Opcode Fuzzy Hash: cf0c270326acc2c26989dcaec4525d53b4b8f6881fb9eb708be334755e47731e
                                                          • Instruction Fuzzy Hash: 3F71F231C0CF809EC73A97388408675BBB16B6A321F4D869BD0978F3E2DA758D448792
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1408264425.0000000000AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c6a40b6b38c96822e8f1d2f6fccb2f6f9bddad49e93c39cc65ac40a4b2843a74
                                                          • Instruction ID: 2925b4d74a811d494d697de37f94356705901f8b2b4be03619f44b9959a0f44b
                                                          • Opcode Fuzzy Hash: c6a40b6b38c96822e8f1d2f6fccb2f6f9bddad49e93c39cc65ac40a4b2843a74
                                                          • Instruction Fuzzy Hash: 4C31B2B1D0C3409ACB35CB28C5483B9BBB06BA5720F4C869BE0878F3A2D6799D04D752
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction ID: 57d61025d726f571206bde1542701663147cad70cf876be0f0a1b4f50b8a7032
                                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction Fuzzy Hash: 9031E7B0B001159BC71CDF0AE484A6AF7E5FB49300BA48696E40ACB356D635EDC1DB89
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: 3d1cb9615f3ea5f5f5e6361dd344e1a47d9da12f05ea6428eae25d07ae27aef1
                                                          • Instruction ID: 88ec2210b97eaeb66bd16e67604d6e353b3070822350be419431805434595ad1
                                                          • Opcode Fuzzy Hash: 3d1cb9615f3ea5f5f5e6361dd344e1a47d9da12f05ea6428eae25d07ae27aef1
                                                          • Instruction Fuzzy Hash: 24414C746083419FDB14DF14C444B1ABBE1BF45318F0988ADE8999B362C739EC45CF4A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 9020231d3715f36c038b75c9c733c79e702cd2adbd383d6332c87f1fdd559c74
                                                          • Instruction ID: e277250e627d10e0330490a348a3b32a96e3d7cb5ffc8e96ca57e5c84c001af0
                                                          • Opcode Fuzzy Hash: 9020231d3715f36c038b75c9c733c79e702cd2adbd383d6332c87f1fdd559c74
                                                          • Instruction Fuzzy Hash: 86210072A14A19EBDB108F26E84176E7BB4FB18354F21853FE886C51D0EB38E490D74E
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 4bc516ce2b159df6ae561d16dde780559593b119f0329b2b52b7213471dda11b
                                                          • Instruction ID: 03ec0e1ddcc1c42b0f32453fdad85b9eaadac3e2e088d633c8de65ee5d072679
                                                          • Opcode Fuzzy Hash: 4bc516ce2b159df6ae561d16dde780559593b119f0329b2b52b7213471dda11b
                                                          • Instruction Fuzzy Hash: 4111D532A04215ABD714EF28D485C6AB7A9EF85324724812FE905DB3D1DB35FC01C799
                                                          APIs
                                                            • Part of subcall function 00404BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00404BEF
                                                            • Part of subcall function 0042525B: __wfsopen.LIBCMT ref: 00425266
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404E0F
                                                            • Part of subcall function 00404B6A: FreeLibrary.KERNEL32(00000000), ref: 00404BA4
                                                            • Part of subcall function 00404C70: _memmove.LIBCMT ref: 00404CBA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Library$Free$Load__wfsopen_memmove
                                                          • String ID:
                                                          • API String ID: 1396898556-0
                                                          • Opcode ID: 38ec5427debe44dbaf010247b0005924d02b12c3bdd9824270641944ab0405bf
                                                          • Instruction ID: 9236aa628d2d192556c2689c07174e5c913df1e85eea92ba98d954e2704214a9
                                                          • Opcode Fuzzy Hash: 38ec5427debe44dbaf010247b0005924d02b12c3bdd9824270641944ab0405bf
                                                          • Instruction Fuzzy Hash: 8511C471600205ABCF14BF71C812FAE77A8AFC4718F10883FF641B71C1DA79AA059B99
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: 1d552beb7b604a3469ce90b415d42699b56cfd27380834e93100c85a5b232174
                                                          • Instruction ID: 88ab595809d02070da327240463ca908ecab152c49247d70464b3f23f3751fdf
                                                          • Opcode Fuzzy Hash: 1d552beb7b604a3469ce90b415d42699b56cfd27380834e93100c85a5b232174
                                                          • Instruction Fuzzy Hash: 4C214874508301DFDB14DF24C444A1ABBE1BF88314F05886DF88957762C739E815CB9B
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 219463ed73227fddf06e24bb3e437384d6eb53c69c69e2cd7c202b796966a717
                                                          • Instruction ID: 8ac4692a4edd8b950221785d74b091900f33ceedfbe0b692f8040025a9c6a4da
                                                          • Opcode Fuzzy Hash: 219463ed73227fddf06e24bb3e437384d6eb53c69c69e2cd7c202b796966a717
                                                          • Instruction Fuzzy Hash: E90126B26013016EC3209F29D806FA7BBD4AB04360F10853FF61ACA1D1EA79F84087D8
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1408264425.0000000000AD0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_ad0000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: 2d1f71e86824403484db654a56edb8165697675e6a8703c938853cbde6cb8151
                                                          • Instruction ID: 66424852c22ab8c46a89255664aab2045572d92f8f02231804377afa08784ac6
                                                          • Opcode Fuzzy Hash: 2d1f71e86824403484db654a56edb8165697675e6a8703c938853cbde6cb8151
                                                          • Instruction Fuzzy Hash: 37015EB1C0D7409ECB258B3484157B67BB46F5A760F09CB9BE0879B3A2D6748D04CB62
                                                          APIs
                                                          • __lock_file.LIBCMT ref: 004248A6
                                                            • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: __getptd_noexit__lock_file
                                                          • String ID:
                                                          • API String ID: 2597487223-0
                                                          • Opcode ID: 067e945b42619cd5e532bb4c940c68e511b21f2bac583ba92795690b8c8a8ee6
                                                          • Instruction ID: a5fe8b5ebddeabdc03b7defa85b5706b3c04092d14be9d7edba4dc341e0ab760
                                                          • Opcode Fuzzy Hash: 067e945b42619cd5e532bb4c940c68e511b21f2bac583ba92795690b8c8a8ee6
                                                          • Instruction Fuzzy Hash: B4F0F431B11224EBDF11BFB2AC053AE36A0EF41328F91440EF42096281DB7C8951DB5D
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404E7E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: 5e403c8a90df1ee0e06371f2d57000cd02bd76b5d635224a6d232ab0319aed21
                                                          • Instruction ID: e65952a518aebd30c2be6c87fe4ab6250acd6cacf129c027b051fb699af34d37
                                                          • Opcode Fuzzy Hash: 5e403c8a90df1ee0e06371f2d57000cd02bd76b5d635224a6d232ab0319aed21
                                                          • Instruction Fuzzy Hash: 85F01CB1501711CFCB349F64E494817B7E1BF94369320893FE2D692650C7359844DB84
                                                          APIs
                                                          • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 004207B0
                                                            • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_memmove
                                                          • String ID:
                                                          • API String ID: 2514874351-0
                                                          • Opcode ID: 5311bc10bcd02c3da6376a961da6fa5eeea3c1e89524b7fc1d9ecfef85fbf38f
                                                          • Instruction ID: 9246c12fdc37fcd41ca4db90d4c6e7f6585ba1f285f6c4ea688713946de2f6cd
                                                          • Opcode Fuzzy Hash: 5311bc10bcd02c3da6376a961da6fa5eeea3c1e89524b7fc1d9ecfef85fbf38f
                                                          • Instruction Fuzzy Hash: F5E0263290012817C720E2599C05FEA77ACDF882A0F0401BAFC0CD3204D964AC808694
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: __wfsopen
                                                          • String ID:
                                                          • API String ID: 197181222-0
                                                          • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                          • Instruction ID: 26467e9723955137fe9c45439b6ceb4f873de5a2d7ef111d81715968119f48b2
                                                          • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                          • Instruction Fuzzy Hash: 99B0927654020CB7CE012A82FC02A593B199B41768F8080A1FB0C181A2A677A6649A99
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1409377799.0000000000E85000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E85000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e85000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction ID: 6f0e4bde5b04dacab323029a3c68c743e3bb5227d689419be1b4d142f666bdaa
                                                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction Fuzzy Hash: A3E0E67498410DDFDB00EFB4D94969E7FB4EF04301F1001A1FD05E2280D6309E508B62
                                                          APIs
                                                            • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0048CB37
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0048CB95
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0048CBD6
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0048CC00
                                                          • SendMessageW.USER32 ref: 0048CC29
                                                          • _wcsncpy.LIBCMT ref: 0048CC95
                                                          • GetKeyState.USER32(00000011), ref: 0048CCB6
                                                          • GetKeyState.USER32(00000009), ref: 0048CCC3
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0048CCD9
                                                          • GetKeyState.USER32(00000010), ref: 0048CCE3
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0048CD0C
                                                          • SendMessageW.USER32 ref: 0048CD33
                                                          • SendMessageW.USER32(?,00001030,?,0048B348), ref: 0048CE37
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0048CE4D
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0048CE60
                                                          • SetCapture.USER32(?), ref: 0048CE69
                                                          • ClientToScreen.USER32(?,?), ref: 0048CECE
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0048CEDB
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0048CEF5
                                                          • ReleaseCapture.USER32 ref: 0048CF00
                                                          • GetCursorPos.USER32(?), ref: 0048CF3A
                                                          • ScreenToClient.USER32(?,?), ref: 0048CF47
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0048CFA3
                                                          • SendMessageW.USER32 ref: 0048CFD1
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0048D00E
                                                          • SendMessageW.USER32 ref: 0048D03D
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0048D05E
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0048D06D
                                                          • GetCursorPos.USER32(?), ref: 0048D08D
                                                          • ScreenToClient.USER32(?,?), ref: 0048D09A
                                                          • GetParent.USER32(?), ref: 0048D0BA
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0048D123
                                                          • SendMessageW.USER32 ref: 0048D154
                                                          • ClientToScreen.USER32(?,?), ref: 0048D1B2
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0048D1E2
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0048D20C
                                                          • SendMessageW.USER32 ref: 0048D22F
                                                          • ClientToScreen.USER32(?,?), ref: 0048D281
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0048D2B5
                                                            • Part of subcall function 004025DB: GetWindowLongW.USER32(?,000000EB), ref: 004025EC
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0048D351
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                          • String ID: @GUI_DRAGID$F$pbL
                                                          • API String ID: 3977979337-2097280626
                                                          • Opcode ID: 4f16bd0a54bb31305c98b4c410e4e88b7a309b179b874218d8dc8bbaa358dfdb
                                                          • Instruction ID: aa2ec0652ddf211ac3aa7531e5acae26c7b16f0e73498be5a03c601873f34f9f
                                                          • Opcode Fuzzy Hash: 4f16bd0a54bb31305c98b4c410e4e88b7a309b179b874218d8dc8bbaa358dfdb
                                                          • Instruction Fuzzy Hash: FE42DE74604640AFC720EF24D888EAEBBE5FF48310F140A2EF559973A1C735E855DB6A
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memmove$_memset
                                                          • String ID: ]K$3cA$DEFINE$P\K$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_A
                                                          • API String ID: 1357608183-1426331590
                                                          • Opcode ID: b28a790e45669a4902d64bf1598fd7c3bcb7bf2305bb98875f8069baf6f44106
                                                          • Instruction ID: 24ac3008a4780d7342888deeabfce4e0a58b67e9339f094d14e98286774badb8
                                                          • Opcode Fuzzy Hash: b28a790e45669a4902d64bf1598fd7c3bcb7bf2305bb98875f8069baf6f44106
                                                          • Instruction Fuzzy Hash: A193A471A002199BDB24CF58C8817EEB7B1FF48315F24815BED45AB392E7789D86CB48
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,?), ref: 004048DF
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0043D665
                                                          • IsIconic.USER32(?), ref: 0043D66E
                                                          • ShowWindow.USER32(?,00000009), ref: 0043D67B
                                                          • SetForegroundWindow.USER32(?), ref: 0043D685
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0043D69B
                                                          • GetCurrentThreadId.KERNEL32 ref: 0043D6A2
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043D6AE
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 0043D6BF
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 0043D6C7
                                                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 0043D6CF
                                                          • SetForegroundWindow.USER32(?), ref: 0043D6D2
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D6E7
                                                          • keybd_event.USER32(00000012,00000000), ref: 0043D6F2
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D6FC
                                                          • keybd_event.USER32(00000012,00000000), ref: 0043D701
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D70A
                                                          • keybd_event.USER32(00000012,00000000), ref: 0043D70F
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D719
                                                          • keybd_event.USER32(00000012,00000000), ref: 0043D71E
                                                          • SetForegroundWindow.USER32(?), ref: 0043D721
                                                          • AttachThreadInput.USER32(?,?,00000000), ref: 0043D748
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: c65cf632393a49513bea40c5a00901192d62317a1410f3ef3d84c68e5820f373
                                                          • Instruction ID: c1ca6a344bcdfaba0e974823023d667c19296b4d148af4653ab9434bf50545cf
                                                          • Opcode Fuzzy Hash: c65cf632393a49513bea40c5a00901192d62317a1410f3ef3d84c68e5820f373
                                                          • Instruction Fuzzy Hash: AE319671A40318BBEB206F619C49F7F7F6CEB48B50F10443AFA04EA1D1D6B45D11ABA9
                                                          APIs
                                                            • Part of subcall function 004587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0045882B
                                                            • Part of subcall function 004587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00458858
                                                            • Part of subcall function 004587E1: GetLastError.KERNEL32 ref: 00458865
                                                          • _memset.LIBCMT ref: 00458353
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 004583A5
                                                          • CloseHandle.KERNEL32(?), ref: 004583B6
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004583CD
                                                          • GetProcessWindowStation.USER32 ref: 004583E6
                                                          • SetProcessWindowStation.USER32(00000000), ref: 004583F0
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0045840A
                                                            • Part of subcall function 004581CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00458309), ref: 004581E0
                                                            • Part of subcall function 004581CB: CloseHandle.KERNEL32(?,?,00458309), ref: 004581F2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                          • String ID: $default$winsta0
                                                          • API String ID: 2063423040-1027155976
                                                          • Opcode ID: 7dea4d1740e8310f6dcdee35c9cc839430f3e6273a811ccccba986a615d76668
                                                          • Instruction ID: 3323b63beeccf06d974511bf231c05544c13643482a2b8641c754c26865e528a
                                                          • Opcode Fuzzy Hash: 7dea4d1740e8310f6dcdee35c9cc839430f3e6273a811ccccba986a615d76668
                                                          • Instruction Fuzzy Hash: F3814871900209BFDF119FA5DC45AEE7B78AF08305F14416EFC10B6262EF399A19DB28
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0046C78D
                                                          • FindClose.KERNEL32(00000000), ref: 0046C7E1
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0046C806
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0046C81D
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0046C844
                                                          • __swprintf.LIBCMT ref: 0046C890
                                                          • __swprintf.LIBCMT ref: 0046C8D3
                                                            • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                          • __swprintf.LIBCMT ref: 0046C927
                                                            • Part of subcall function 00423698: __woutput_l.LIBCMT ref: 004236F1
                                                          • __swprintf.LIBCMT ref: 0046C975
                                                            • Part of subcall function 00423698: __flsbuf.LIBCMT ref: 00423713
                                                            • Part of subcall function 00423698: __flsbuf.LIBCMT ref: 0042372B
                                                          • __swprintf.LIBCMT ref: 0046C9C4
                                                          • __swprintf.LIBCMT ref: 0046CA13
                                                          • __swprintf.LIBCMT ref: 0046CA62
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                          • API String ID: 3953360268-2428617273
                                                          • Opcode ID: 511509d096d8a85c851f2d3f16a46ec9b1aa2dd11cc0fa5b5634bac435d16de7
                                                          • Instruction ID: 7d9c3182f1c50569ad22dcb29b7867164fdd6ce968260aea251e7ba13e5350ae
                                                          • Opcode Fuzzy Hash: 511509d096d8a85c851f2d3f16a46ec9b1aa2dd11cc0fa5b5634bac435d16de7
                                                          • Instruction Fuzzy Hash: AFA13EB1504304ABC710EFA5C885DAFB7ECFF94708F40492EF585D6192EA38DA08CB66
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 0046EFB6
                                                          • _wcscmp.LIBCMT ref: 0046EFCB
                                                          • _wcscmp.LIBCMT ref: 0046EFE2
                                                          • GetFileAttributesW.KERNEL32(?), ref: 0046EFF4
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 0046F00E
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0046F026
                                                          • FindClose.KERNEL32(00000000), ref: 0046F031
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 0046F04D
                                                          • _wcscmp.LIBCMT ref: 0046F074
                                                          • _wcscmp.LIBCMT ref: 0046F08B
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0046F09D
                                                          • SetCurrentDirectoryW.KERNEL32(004B8920), ref: 0046F0BB
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0046F0C5
                                                          • FindClose.KERNEL32(00000000), ref: 0046F0D2
                                                          • FindClose.KERNEL32(00000000), ref: 0046F0E4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1803514871-438819550
                                                          • Opcode ID: 6ca42bdee5e764a2d4c938babfd9147ccfee36eb28773e9f100ec5c7d0d625b2
                                                          • Instruction ID: e0d4b25dfa95f140917fd6c0b332215adfde449a0ea65fd213ed944f24ec6cf3
                                                          • Opcode Fuzzy Hash: 6ca42bdee5e764a2d4c938babfd9147ccfee36eb28773e9f100ec5c7d0d625b2
                                                          • Instruction Fuzzy Hash: EC31E7325011187ADF14EFA4EC48AEF77AC9F44360F10057BE844D2191EB79DA88CB6E
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00480953
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,0048F910,00000000,?,00000000,?,?), ref: 004809C1
                                                          • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00480A09
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00480A92
                                                          • RegCloseKey.ADVAPI32(?), ref: 00480DB2
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00480DBF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectCreateRegistryValue
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 536824911-966354055
                                                          • Opcode ID: 8f227258a0dab7c0859dbc81476a8b1bf560c483aaf7810dacbfdfc85d42ebac
                                                          • Instruction ID: 75f0257f13d9dd97868b06569ad7b6a65722ecc89240c550ead6eefe92fcdcfb
                                                          • Opcode Fuzzy Hash: 8f227258a0dab7c0859dbc81476a8b1bf560c483aaf7810dacbfdfc85d42ebac
                                                          • Instruction Fuzzy Hash: 3E023A756106119FCB54EF15D841E2AB7E5FF89314F04886EF8899B3A2CB38EC45CB89
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0DJ$0EJ$0FJ$3cA$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pGJ$_A
                                                          • API String ID: 0-559809668
                                                          • Opcode ID: 6a8c43c5cd2287656802195d535ea908290b48d8ab3bfd826a36c9d68e310c78
                                                          • Instruction ID: 6096d484c95c14ad7aa8192e29e4e3e8d71b99b3f093478e4f466f6acf52d5c9
                                                          • Opcode Fuzzy Hash: 6a8c43c5cd2287656802195d535ea908290b48d8ab3bfd826a36c9d68e310c78
                                                          • Instruction Fuzzy Hash: 13727E75E002199BDB14CF59C8807EEB7B5FF48311F15816BE809EB291E7389E85CB98
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 0046F113
                                                          • _wcscmp.LIBCMT ref: 0046F128
                                                          • _wcscmp.LIBCMT ref: 0046F13F
                                                            • Part of subcall function 00464385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 004643A0
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0046F16E
                                                          • FindClose.KERNEL32(00000000), ref: 0046F179
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 0046F195
                                                          • _wcscmp.LIBCMT ref: 0046F1BC
                                                          • _wcscmp.LIBCMT ref: 0046F1D3
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0046F1E5
                                                          • SetCurrentDirectoryW.KERNEL32(004B8920), ref: 0046F203
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0046F20D
                                                          • FindClose.KERNEL32(00000000), ref: 0046F21A
                                                          • FindClose.KERNEL32(00000000), ref: 0046F22C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 1824444939-438819550
                                                          • Opcode ID: 5e4c1ca136502ca1550e0c7352cbc5842e7fcfe98f56b9ff86b85f6952a77760
                                                          • Instruction ID: 359f8111c83e04d014ff149dee767818393646aa3285bf91305061d844a33625
                                                          • Opcode Fuzzy Hash: 5e4c1ca136502ca1550e0c7352cbc5842e7fcfe98f56b9ff86b85f6952a77760
                                                          • Instruction Fuzzy Hash: 1031C3365001196ADF10AEA4FC54AEE77AC9F45360F2005BBE844A2190EA39DE89CA6D
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0046A20F
                                                          • __swprintf.LIBCMT ref: 0046A231
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 0046A26E
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0046A293
                                                          • _memset.LIBCMT ref: 0046A2B2
                                                          • _wcsncpy.LIBCMT ref: 0046A2EE
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0046A323
                                                          • CloseHandle.KERNEL32(00000000), ref: 0046A32E
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 0046A337
                                                          • CloseHandle.KERNEL32(00000000), ref: 0046A341
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 2733774712-3457252023
                                                          • Opcode ID: f5c4c2d66afbbd10ee5f85d9a25c73fd31d49a88663bd8fadf72adc8619a6d0a
                                                          • Instruction ID: f10b276181cf8096dd79107661fba1eb4aa855f6953dd7c4d63ebe7d830bec3b
                                                          • Opcode Fuzzy Hash: f5c4c2d66afbbd10ee5f85d9a25c73fd31d49a88663bd8fadf72adc8619a6d0a
                                                          • Instruction Fuzzy Hash: 1E31C571500119ABDB20DFA0DC49FEF77BCEF88704F1044BAF908E2260E77496948B29
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00460097
                                                          • SetKeyboardState.USER32(?), ref: 00460102
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00460122
                                                          • GetKeyState.USER32(000000A0), ref: 00460139
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00460168
                                                          • GetKeyState.USER32(000000A1), ref: 00460179
                                                          • GetAsyncKeyState.USER32(00000011), ref: 004601A5
                                                          • GetKeyState.USER32(00000011), ref: 004601B3
                                                          • GetAsyncKeyState.USER32(00000012), ref: 004601DC
                                                          • GetKeyState.USER32(00000012), ref: 004601EA
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00460213
                                                          • GetKeyState.USER32(0000005B), ref: 00460221
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: f2f36dec6c4a46bfceebef3e5bbc60e354e372eebad2095a13b7bb07ab711d72
                                                          • Instruction ID: c6705f0abb03acfe1c66d12a8beead0d319d3067caf51b1e954f1b2a293a3a50
                                                          • Opcode Fuzzy Hash: f2f36dec6c4a46bfceebef3e5bbc60e354e372eebad2095a13b7bb07ab711d72
                                                          • Instruction Fuzzy Hash: 7F51BC2090478829FB35D7A098547EBBFB49F12380F08459F99C2566C3FA5C9A8CC75B
                                                          APIs
                                                            • Part of subcall function 00480E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004804AC
                                                            • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                            • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0048054B
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 004805E3
                                                          • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00480822
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0048082F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1240663315-0
                                                          • Opcode ID: c21a4a07d85489fa2b475113d27af1da06aad6be12126d572a2106395dc058cb
                                                          • Instruction ID: efbac3d2c4afa975f371ae5d5fee671ec22ce1fa5a9a6cb729be810612663562
                                                          • Opcode Fuzzy Hash: c21a4a07d85489fa2b475113d27af1da06aad6be12126d572a2106395dc058cb
                                                          • Instruction Fuzzy Hash: A5E16E71614200AFCB54EF25C891D2FBBE4EF89314B04896EF84ADB3A2D634ED45CB56
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: 0df1e9f21622c81d98583a297edaa4e67f2beae9162bbdb6d1b4a4ef07667aeb
                                                          • Instruction ID: 6a8dd1f95291b63ae5b16d2a5a0d869dcb5166510358231783c1e180ef80644f
                                                          • Opcode Fuzzy Hash: 0df1e9f21622c81d98583a297edaa4e67f2beae9162bbdb6d1b4a4ef07667aeb
                                                          • Instruction Fuzzy Hash: CE2191352002109FDB00AF54EC09B6E7BA8EF44751F10847AF945E72A2EB38AC05CB5D
                                                          APIs
                                                            • Part of subcall function 00404750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00404743,?,?,004037AE,?), ref: 00404770
                                                            • Part of subcall function 00464A31: GetFileAttributesW.KERNEL32(?,0046370B), ref: 00464A32
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 004638A3
                                                          • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0046394B
                                                          • MoveFileW.KERNEL32(?,?), ref: 0046395E
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 0046397B
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0046399D
                                                          • FindClose.KERNEL32(00000000,?,?,?,?), ref: 004639B9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 4002782344-1173974218
                                                          • Opcode ID: e41a741f13836c122e1a93b35399af2899a1ae988daff58317c02930b9991c4e
                                                          • Instruction ID: 5f3270bf9419f81a9c4f0e0ab399985bb250d256c3569b2459e2ec67edc6ab47
                                                          • Opcode Fuzzy Hash: e41a741f13836c122e1a93b35399af2899a1ae988daff58317c02930b9991c4e
                                                          • Instruction Fuzzy Hash: 5551717180514CAACF05EFA1C9929EEB778AF14319F60047EE40277191EB396F0DCB5A
                                                          APIs
                                                            • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                          • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0046F440
                                                          • Sleep.KERNEL32(0000000A), ref: 0046F470
                                                          • _wcscmp.LIBCMT ref: 0046F484
                                                          • _wcscmp.LIBCMT ref: 0046F49F
                                                          • FindNextFileW.KERNEL32(?,?), ref: 0046F53D
                                                          • FindClose.KERNEL32(00000000), ref: 0046F553
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                          • String ID: *.*
                                                          • API String ID: 713712311-438819550
                                                          • Opcode ID: b21b5751c67d20c7492c03ab1b01f4f28f86a4b8690f8ee467c0eb4bada205d6
                                                          • Instruction ID: 52678bcd3f78e7a2dee1500e624958e336d76892905c76040bb4fc6126c74c58
                                                          • Opcode Fuzzy Hash: b21b5751c67d20c7492c03ab1b01f4f28f86a4b8690f8ee467c0eb4bada205d6
                                                          • Instruction Fuzzy Hash: D0418D71904219AFCF10EF64DC45AEFBBB4FF04314F50446BE855A2291EB38AE88CB59
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: __itow__swprintf
                                                          • String ID: 3cA$_A
                                                          • API String ID: 674341424-3480954128
                                                          • Opcode ID: c8ecb1014fa8dcfad6e9c2986c3e2813fc9b0cf9ebf1d5bf7650c4e30b322340
                                                          • Instruction ID: 703a96bf305cb9905ff3d3c25826e0fcfbd93ba8a00a4d78e9854e8314894fca
                                                          • Opcode Fuzzy Hash: c8ecb1014fa8dcfad6e9c2986c3e2813fc9b0cf9ebf1d5bf7650c4e30b322340
                                                          • Instruction Fuzzy Hash: AB229B716083009FD724DF14C881BABB7E4AF85314F11492EF89A97392DB78E945CB9B
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: ef6eefa2f9032fef0d16e177236bcb3558174e7ce64840fb1b9b175fab15d2a1
                                                          • Instruction ID: fe3fa380dd79410c0d4e58696af30f423fcd40af0ea7aa6f8d28fb308e13f721
                                                          • Opcode Fuzzy Hash: ef6eefa2f9032fef0d16e177236bcb3558174e7ce64840fb1b9b175fab15d2a1
                                                          • Instruction Fuzzy Hash: 9D12AC70A00609DFCF04DFA5D981AEEB3F5FF88304F10452AE846A7291EB39AD55CB59
                                                          APIs
                                                            • Part of subcall function 004587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0045882B
                                                            • Part of subcall function 004587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00458858
                                                            • Part of subcall function 004587E1: GetLastError.KERNEL32 ref: 00458865
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 004651F9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-194228
                                                          • Opcode ID: 54329107cda8fc21248f4887d0b4108f88f23b4200919f0ee4a3738f6efa1ba1
                                                          • Instruction ID: a9b7a44e2451b6884de2a96c8f52f71cfd0e95415fa4985b61f57267d5601e10
                                                          • Opcode Fuzzy Hash: 54329107cda8fc21248f4887d0b4108f88f23b4200919f0ee4a3738f6efa1ba1
                                                          • Instruction Fuzzy Hash: D201F7317916116BF7286668ACAAFBB7358DB05345F2008BBFD03E21D2FD591C058A9F
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 004762DC
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 004762EB
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00476307
                                                          • listen.WSOCK32(00000000,00000005), ref: 00476316
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00476330
                                                          • closesocket.WSOCK32(00000000,00000000), ref: 00476344
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketlistensocket
                                                          • String ID:
                                                          • API String ID: 1279440585-0
                                                          • Opcode ID: 146cf2852e84b98676a1cb8b53444c853230e893978cbd9bf0c490d800ba36be
                                                          • Instruction ID: 9cc0b371228dcaf8913226d6fe42490e105b9b769aefcc5547ebbaeef9b3f94b
                                                          • Opcode Fuzzy Hash: 146cf2852e84b98676a1cb8b53444c853230e893978cbd9bf0c490d800ba36be
                                                          • Instruction Fuzzy Hash: 6521F2312006049FCB10FF64C845A6EB7BAEF44324F15856EEC1AA73D2C734AC05CB59
                                                          APIs
                                                            • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                                            • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                                          • _memmove.LIBCMT ref: 00450258
                                                          • _memmove.LIBCMT ref: 0045036D
                                                          • _memmove.LIBCMT ref: 00450414
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1300846289-0
                                                          • Opcode ID: 0b69588945e0b9e04a1e8208d8dd6483ea26d008b6fb0c96b79dce7983f255cc
                                                          • Instruction ID: ce31bd404333394545349dab4fd8ad238969c684e33d592a62d2001407cdf1f6
                                                          • Opcode Fuzzy Hash: 0b69588945e0b9e04a1e8208d8dd6483ea26d008b6fb0c96b79dce7983f255cc
                                                          • Instruction Fuzzy Hash: 3202E270A00205DBCF04DF65D9816AEBBF5EF84304F54806EE80ADB392EB39D955CB99
                                                          APIs
                                                            • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 004019FA
                                                          • GetSysColor.USER32(0000000F), ref: 00401A4E
                                                          • SetBkColor.GDI32(?,00000000), ref: 00401A61
                                                            • Part of subcall function 00401290: DefDlgProcW.USER32(?,00000020,?), ref: 004012D8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ColorProc$LongWindow
                                                          • String ID:
                                                          • API String ID: 3744519093-0
                                                          • Opcode ID: 8db6b4c7db5f97784a80f15b687025ec058e6c3025e7102d3aafc5b58ad8fc88
                                                          • Instruction ID: d041ec2a837aeb515327988813bafb0785b4d0a615f46c6b1421ede386c2745f
                                                          • Opcode Fuzzy Hash: 8db6b4c7db5f97784a80f15b687025ec058e6c3025e7102d3aafc5b58ad8fc88
                                                          • Instruction Fuzzy Hash: A4A124B1202544BAE629BA694C88F7F255CDF45345F14053FF602F62F2CA3C9D429ABE
                                                          APIs
                                                            • Part of subcall function 00477D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00477DB6
                                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0047679E
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 004767C7
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00476800
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 0047680D
                                                          • closesocket.WSOCK32(00000000,00000000), ref: 00476821
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 99427753-0
                                                          • Opcode ID: c3678cbd9f04907b78b21f7c60552e65a77e2ac58af8dde8cfff1331ff6b0f68
                                                          • Instruction ID: 4f4fa4b069b112be458f20050bee2991dabce79e459f6d74e9331a247e2dcb9e
                                                          • Opcode Fuzzy Hash: c3678cbd9f04907b78b21f7c60552e65a77e2ac58af8dde8cfff1331ff6b0f68
                                                          • Instruction Fuzzy Hash: E941D275A00600AFDB10BF258C86F6E77A89F45718F05C56EFA59BB3C3CA789D008799
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: 7ffe818374d74fed162708100ced44c3bb0424a7746e5ca8e896d501ecac1497
                                                          • Instruction ID: 2bf7cd1b22f0a435aba1bf6783624a0e9851140f374647b9b1574053626a0f4e
                                                          • Opcode Fuzzy Hash: 7ffe818374d74fed162708100ced44c3bb0424a7746e5ca8e896d501ecac1497
                                                          • Instruction Fuzzy Hash: BB11B232700911ABEB217F269C44A6F7B99EF447A1B40483EFC45E3242DB789C0287AD
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 004580C0
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 004580CA
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 004580D9
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 004580E0
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 004580F6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 81dd5e2c95f6d95ffeb542e083d257e40e9b1a3105d490f338a4361df31bd442
                                                          • Instruction ID: 8dae455e1ba13099d0d58f164bb34b259a0b96a713bdc7d240504e0717c8d456
                                                          • Opcode Fuzzy Hash: 81dd5e2c95f6d95ffeb542e083d257e40e9b1a3105d490f338a4361df31bd442
                                                          • Instruction Fuzzy Hash: EBF08C30200614AFEB104FA4EC8CE6B3BACEF4A755B10043EF90592251DF649C09DB64
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 0046C432
                                                          • CoCreateInstance.OLE32(00492D6C,00000000,00000001,00492BDC,?), ref: 0046C44A
                                                            • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                          • CoUninitialize.OLE32 ref: 0046C6B7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_memmove
                                                          • String ID: .lnk
                                                          • API String ID: 2683427295-24824748
                                                          • Opcode ID: 8be31365239305a4f0ecbc96338834b64287ccbcc385a5ffb8382792e3c7b4fb
                                                          • Instruction ID: adb56a4b7a52abdaef05598002f92e73435f728c8d9d90c66f29e414dbdf6fe1
                                                          • Opcode Fuzzy Hash: 8be31365239305a4f0ecbc96338834b64287ccbcc385a5ffb8382792e3c7b4fb
                                                          • Instruction Fuzzy Hash: 5AA14AB1104205AFD700EF55C881EAFB7E8EF85308F00492EF595972A2EB75EE09CB56
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00404AD0), ref: 00404B45
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00404B57
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetNativeSystemInfo$kernel32.dll
                                                          • API String ID: 2574300362-192647395
                                                          • Opcode ID: a73fa7ec54199ac5cd1cc7a5405e6f37b5fe8d156d6918c0c451661c08ead94f
                                                          • Instruction ID: eac2b9657e48c1354d3ce07b29e145d4c0a45f8badf8df95cafcbf2a1bd35060
                                                          • Opcode Fuzzy Hash: a73fa7ec54199ac5cd1cc7a5405e6f37b5fe8d156d6918c0c451661c08ead94f
                                                          • Instruction Fuzzy Hash: 8ED01274A10713CFD720AF31D818B0A76E4AF45751B218C3F9485D6690D678F8C4C75C
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 0047EE3D
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 0047EE4B
                                                            • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 0047EF0B
                                                          • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0047EF1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                          • String ID:
                                                          • API String ID: 2576544623-0
                                                          • Opcode ID: 8474e8f7e6d518a839c74cc5eb54a158aeec258ffafa63196fda6ec9f60604bc
                                                          • Instruction ID: a98c0e68db7b9d45d0fd814aff1298f869d04e0007e226020b87bcf654703779
                                                          • Opcode Fuzzy Hash: 8474e8f7e6d518a839c74cc5eb54a158aeec258ffafa63196fda6ec9f60604bc
                                                          • Instruction Fuzzy Hash: BB519171504300AFD310EF21CC85EABB7E8EF88714F10492EF595A72A1DB34AD08CB96
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0045E628
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($|
                                                          • API String ID: 1659193697-1631851259
                                                          • Opcode ID: 9168c4c44934064b777b19449f8ddf58753b33bee85af42b019ce53e691585fc
                                                          • Instruction ID: d66d97c7bb63d5e7dad9b567a4e3f94d41a6da7275ee88609bc8c1bec3a8e44c
                                                          • Opcode Fuzzy Hash: 9168c4c44934064b777b19449f8ddf58753b33bee85af42b019ce53e691585fc
                                                          • Instruction Fuzzy Hash: 21322675A007059FD728CF2AC481A6AB7F0FF48310B15C56EE89ADB3A2E774E941CB44
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0047180A,00000000), ref: 004723E1
                                                          • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00472418
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Internet$AvailableDataFileQueryRead
                                                          • String ID:
                                                          • API String ID: 599397726-0
                                                          • Opcode ID: 521e8ed97bf12570bed30d1cea6a3edf724572c9ec4fdcea442398a5e3207fd9
                                                          • Instruction ID: 97e6fa55f52fdedc64eb36c533065f345fcd4e8e1beeb73d4f24c64f527f6271
                                                          • Opcode Fuzzy Hash: 521e8ed97bf12570bed30d1cea6a3edf724572c9ec4fdcea442398a5e3207fd9
                                                          • Instruction Fuzzy Hash: 0941DA71604205BFEB20DE65DE81EFB77BCEB40314F10806FFA49A6241DABC9E419658
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0046B343
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0046B39D
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0046B3EA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: e21071a1f309060a69139baf21bf0b81cefe721e06a6328ca3586a1a9a93214d
                                                          • Instruction ID: 737ef1c34fd19c378388d330bbb387c55d680846c188baab6e7c30573ba64571
                                                          • Opcode Fuzzy Hash: e21071a1f309060a69139baf21bf0b81cefe721e06a6328ca3586a1a9a93214d
                                                          • Instruction Fuzzy Hash: 7D21AE75A10108EFCB00EFA5D880AEEBBB8FF48314F0080AAE905AB351DB359D59CB55
                                                          APIs
                                                            • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                                            • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0045882B
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00458858
                                                          • GetLastError.KERNEL32 ref: 00458865
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1922334811-0
                                                          • Opcode ID: e40a1783a4a31f9ec7d594cc04a7385dd35e7a4d1765caa27eb251e992861782
                                                          • Instruction ID: 5e41a7b511489fb1457012ee205441660039eb57adee2e696ecce50f3e5e177b
                                                          • Opcode Fuzzy Hash: e40a1783a4a31f9ec7d594cc04a7385dd35e7a4d1765caa27eb251e992861782
                                                          • Instruction Fuzzy Hash: 7511BFB2514204AFE718EFA4EC85D2BB7F8EB05315B60852EF85593212EF34BC448B64
                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00458774
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0045878B
                                                          • FreeSid.ADVAPI32(?), ref: 0045879B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: 008726f0c27652ffd03f151f72c22d205906185045b9f325022e2ab268aa6496
                                                          • Instruction ID: 222101879978235e3db2a0a583f2c1bf244a93baf2b2f2d6b5292d8d16c370cf
                                                          • Opcode Fuzzy Hash: 008726f0c27652ffd03f151f72c22d205906185045b9f325022e2ab268aa6496
                                                          • Instruction Fuzzy Hash: 4CF04F7591130CBFDF00DFF4DC89AAEB7BCEF09201F104879A901E2181D7756A088B54
                                                          APIs
                                                          • __time64.LIBCMT ref: 0046889B
                                                            • Part of subcall function 0042520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00468F6E,00000000,?,?,?,?,0046911F,00000000,?), ref: 00425213
                                                            • Part of subcall function 0042520A: __aulldiv.LIBCMT ref: 00425233
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Time$FileSystem__aulldiv__time64
                                                          • String ID: 0eL
                                                          • API String ID: 2893107130-3167399643
                                                          • Opcode ID: 173a61627ebe1b4304b39b54128586dabbe463c8e4c1c1e482927ec7599268c1
                                                          • Instruction ID: 2c57299538d283c5d644ae0a39161a0e0d0ec28ce0c746f6c7e9e831f8b60585
                                                          • Opcode Fuzzy Hash: 173a61627ebe1b4304b39b54128586dabbe463c8e4c1c1e482927ec7599268c1
                                                          • Instruction Fuzzy Hash: B421AF326256108BC729CF29D841A52B3E1EFA5311B698F6DD0F5CB2C0DA38A905CB58
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0046C6FB
                                                          • FindClose.KERNEL32(00000000), ref: 0046C72B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: 45c62872381a6feff6d223480115480bdbba5ccbc8d99e64919f1b60502656e7
                                                          • Instruction ID: b4b64e4e0be63edce78860a78e1dfdfe78961efcf08952f795b51eb70efe8952
                                                          • Opcode Fuzzy Hash: 45c62872381a6feff6d223480115480bdbba5ccbc8d99e64919f1b60502656e7
                                                          • Instruction Fuzzy Hash: 411152726106049FDB10EF29D88592AF7E5EF85325F00C52EF9A5D7391DB34AC05CB85
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00479468,?,0048FB84,?), ref: 0046A097
                                                          • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00479468,?,0048FB84,?), ref: 0046A0A9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: 472a7cd9639d892b3363a091e7d83c08bd9bcb7ed13b50b01156cac8ad95666a
                                                          • Instruction ID: 2c9db32d3ae4548df1de74cdb7d607b6943671b75e71bd67b23ca617ca970478
                                                          • Opcode Fuzzy Hash: 472a7cd9639d892b3363a091e7d83c08bd9bcb7ed13b50b01156cac8ad95666a
                                                          • Instruction Fuzzy Hash: D8F0823550522DABDB21AFA4CC48FEE776CBF08361F00416AF909E6191DA349954CBA6
                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00458309), ref: 004581E0
                                                          • CloseHandle.KERNEL32(?,?,00458309), ref: 004581F2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: eb7ac69ade783395277c4643d4176b5893d02204cea2e8a5f246f56db08c2cc2
                                                          • Instruction ID: 9bafbd08ffd8acbbb2d026fb6ea58a2c51283803ccb0941fee12b6a17b14d6d6
                                                          • Opcode Fuzzy Hash: eb7ac69ade783395277c4643d4176b5893d02204cea2e8a5f246f56db08c2cc2
                                                          • Instruction Fuzzy Hash: 13E04632000620AEE7212B61FC08D777BEAEB04314720882EB8A680431CF22AC90DB18
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,00494178,00428D57,00493E50,?,?,00000001), ref: 0042A15A
                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0042A163
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: c2bfc4d91f5eef072ecd4d4a99461c52a82975f392c39b974fa7ca05b3ef40fa
                                                          • Instruction ID: 9da78fce3b57c7d2137df8720d13279edd616241823e717daaa40eb201d223bb
                                                          • Opcode Fuzzy Hash: c2bfc4d91f5eef072ecd4d4a99461c52a82975f392c39b974fa7ca05b3ef40fa
                                                          • Instruction Fuzzy Hash: CCB09231254308ABCA022B91EC09B8C3F68EB46AA2F404434FA0D84C60CB6254548B99
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fe7d9b8eee1d273b37d623b7cc6cd26b30c9621dfee01b7311cae72a06f2c816
                                                          • Instruction ID: 9dbe1c865c2330f56ffee62ed517aae1867acb93b770053fb6672ec4a27fddfc
                                                          • Opcode Fuzzy Hash: fe7d9b8eee1d273b37d623b7cc6cd26b30c9621dfee01b7311cae72a06f2c816
                                                          • Instruction Fuzzy Hash: 08322861E29F114DD7239634D832336A258AFB73C8F95D737F819B5AA5EB28D4C34208
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9a83e6c9a1e03463649304356993a4cc28f03311dd18012bd76db8a2bb8b356c
                                                          • Instruction ID: 6c6381ca5121d9a8a5ca5470a2620081c1b3ce1be078dbaf297b8ac86cff2730
                                                          • Opcode Fuzzy Hash: 9a83e6c9a1e03463649304356993a4cc28f03311dd18012bd76db8a2bb8b356c
                                                          • Instruction Fuzzy Hash: E2B10130E2AF414DD72396398935336BA5CAFBB2C5F51D72BFC2670D22EB2185934185
                                                          APIs
                                                          • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00464C76
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: mouse_event
                                                          • String ID:
                                                          • API String ID: 2434400541-0
                                                          • Opcode ID: ee9df15493a40b048f6a63b66618f3ae232bfa5e5e2bfa15106318706817909b
                                                          • Instruction ID: b34e2a9394489d035c963e7dd8f40c9807a13273b0ab6c7f74163ad9f46ae88e
                                                          • Opcode Fuzzy Hash: ee9df15493a40b048f6a63b66618f3ae232bfa5e5e2bfa15106318706817909b
                                                          • Instruction Fuzzy Hash: BED05EA032220838ECA807209D5FF7F1109E3C0B81F96854B7241853C1F8DC6801A03F
                                                          APIs
                                                          • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00458389), ref: 004587D1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: LogonUser
                                                          • String ID:
                                                          • API String ID: 1244722697-0
                                                          • Opcode ID: 18205445d52b48e02bcf404b6a946f346a5f79f7dd958708f793c28153997f24
                                                          • Instruction ID: bbaf709efb0beb88cdfa5f1a33ae6004459e2c5163e494cc38a8a30eb56211a1
                                                          • Opcode Fuzzy Hash: 18205445d52b48e02bcf404b6a946f346a5f79f7dd958708f793c28153997f24
                                                          • Instruction Fuzzy Hash: 49D05E3226050EAFEF018EA4DC01EAE3B69EB04B01F408521FE15D50A1C775E835AB60
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0042A12A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: de316c34264f802ad97e41e2d96b97a4976e2443a0324b54249a0beeda03384a
                                                          • Instruction ID: 5f0b767449e3d37fa0a9cb76ca1a1966b2bcebad2f74a673b8e7725f9ca30b43
                                                          • Opcode Fuzzy Hash: de316c34264f802ad97e41e2d96b97a4976e2443a0324b54249a0beeda03384a
                                                          • Instruction Fuzzy Hash: E2A0113000020CAB8A022B82EC08888BFACEA022A0B008030F80C808228B32A8208A88
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1409377799.0000000000E85000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E85000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e85000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: k^
                                                          • API String ID: 0-1998660363
                                                          • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                          • Instruction ID: 064161472a6c71b71f9576700c16895ec835d174730950781e27d188e2454bd7
                                                          • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                          • Instruction Fuzzy Hash: 37019678A01109EFCB44EF98C6909AEF7F5FB48310F608599DC09A7305D730AE41DB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bc918cabfbc13eeeaccb278bb908b555cf4655f640fadc8373e86b06f087c2cb
                                                          • Instruction ID: d3e05baf70842595a15b67714876080b4d37379fdc1224c105ba09137936e944
                                                          • Opcode Fuzzy Hash: bc918cabfbc13eeeaccb278bb908b555cf4655f640fadc8373e86b06f087c2cb
                                                          • Instruction Fuzzy Hash: 44223730904506CBDF288A68C4A47BEB7A1BF41345F28816FDD468B693DB7C9CD6C74A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                          • Instruction ID: 35e5cfd0643d00128ec34ecd890c43f992cb4d917009b55117061340238bc551
                                                          • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                          • Instruction Fuzzy Hash: 18C1D83230507349DF2D4639953403FFAA15EA27B139A076FD8B3CB2D4EE18D965D624
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                          • Instruction ID: 4494295b5c4546222a84ad3f443fcd2c01bced2acdb834a923f1c328fe2fc13d
                                                          • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                          • Instruction Fuzzy Hash: CAC1D4333090B34ADF2D4639953403FBAA15EA27B139B036FD4B2DB2D4EE18D925D624
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ab2fee5558319bb7b77599fdacabd9ee24db5531fb8add38223017fc8891590f
                                                          • Instruction ID: 9b73fb6413c2de0e7a9154eaf4436e2265fe1c02b938a501d87519b57db06e1e
                                                          • Opcode Fuzzy Hash: ab2fee5558319bb7b77599fdacabd9ee24db5531fb8add38223017fc8891590f
                                                          • Instruction Fuzzy Hash: FF310A32A092845BCF328E587808AB57FA8BBA3775F1DC156E45C8B1A2D3219C44FE61
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1409377799.0000000000E85000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E85000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e85000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                          • Instruction ID: 6c708f9e20c88803ac86e286b9a2ca2afb1184adefa9d3ba475ada5300bd511f
                                                          • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                          • Instruction Fuzzy Hash: FA41B371D1051CEBCF48CFADC991AEEBBF2AF88201F948299D516AB345D730AB41DB50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1409377799.0000000000E85000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E85000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e85000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                          • Instruction ID: 7d21c948ec64eb0fe8257dabd8abf86f51b01902a4d2088751cbe17b91760562
                                                          • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                          • Instruction Fuzzy Hash: D7018078A00209EFCB44EF98C6909AEF7B5FB58310B608599EC09A7341E730AE41DB80
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1409377799.0000000000E85000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E85000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_e85000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                          • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                          • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                          • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 0047785B
                                                          • DeleteObject.GDI32(00000000), ref: 0047786D
                                                          • DestroyWindow.USER32 ref: 0047787B
                                                          • GetDesktopWindow.USER32 ref: 00477895
                                                          • GetWindowRect.USER32(00000000), ref: 0047789C
                                                          • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 004779DD
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 004779ED
                                                          • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477A35
                                                          • GetClientRect.USER32(00000000,?), ref: 00477A41
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00477A7B
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477A9D
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477AB0
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477ABB
                                                          • GlobalLock.KERNEL32(00000000), ref: 00477AC4
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477AD3
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00477ADC
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477AE3
                                                          • GlobalFree.KERNEL32(00000000), ref: 00477AEE
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477B00
                                                          • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00492CAC,00000000), ref: 00477B16
                                                          • GlobalFree.KERNEL32(00000000), ref: 00477B26
                                                          • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00477B4C
                                                          • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00477B6B
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477B8D
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477D7A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-2373415609
                                                          • Opcode ID: cbe7ba0df42561e6311dda8264485de7e40118ff6f13b361737e76822355802e
                                                          • Instruction ID: 98d8c47751f1291c48596143d1a8e41d269c6aae9b6b01708d63eada7aa7ec2c
                                                          • Opcode Fuzzy Hash: cbe7ba0df42561e6311dda8264485de7e40118ff6f13b361737e76822355802e
                                                          • Instruction Fuzzy Hash: DE027A71900105EFDB14DFA4DC89EAE7BB9FF49310F10856AF905AB2A1C738AD41CB68
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,0048F910), ref: 00483627
                                                          • IsWindowVisible.USER32(?), ref: 0048364B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpperVisibleWindow
                                                          • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                          • API String ID: 4105515805-45149045
                                                          • Opcode ID: df18ccac80ca4098b50a46d9e4b82a0c4588cfc9e14ecf85f4615084e1af2d64
                                                          • Instruction ID: 9f5fdaa8788cae778637d634d7abea83d78ef325d3b9343814b8d9d38e530adb
                                                          • Opcode Fuzzy Hash: df18ccac80ca4098b50a46d9e4b82a0c4588cfc9e14ecf85f4615084e1af2d64
                                                          • Instruction Fuzzy Hash: 28D19E702042009BCA04FF11C451A6E77E5AF55759F54886EF8826B3A3DB3DEE0ACB5A
                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 0048A630
                                                          • GetSysColorBrush.USER32(0000000F), ref: 0048A661
                                                          • GetSysColor.USER32(0000000F), ref: 0048A66D
                                                          • SetBkColor.GDI32(?,000000FF), ref: 0048A687
                                                          • SelectObject.GDI32(?,00000000), ref: 0048A696
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 0048A6C1
                                                          • GetSysColor.USER32(00000010), ref: 0048A6C9
                                                          • CreateSolidBrush.GDI32(00000000), ref: 0048A6D0
                                                          • FrameRect.USER32(?,?,00000000), ref: 0048A6DF
                                                          • DeleteObject.GDI32(00000000), ref: 0048A6E6
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 0048A731
                                                          • FillRect.USER32(?,?,00000000), ref: 0048A763
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0048A78E
                                                            • Part of subcall function 0048A8CA: GetSysColor.USER32(00000012), ref: 0048A903
                                                            • Part of subcall function 0048A8CA: SetTextColor.GDI32(?,?), ref: 0048A907
                                                            • Part of subcall function 0048A8CA: GetSysColorBrush.USER32(0000000F), ref: 0048A91D
                                                            • Part of subcall function 0048A8CA: GetSysColor.USER32(0000000F), ref: 0048A928
                                                            • Part of subcall function 0048A8CA: GetSysColor.USER32(00000011), ref: 0048A945
                                                            • Part of subcall function 0048A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0048A953
                                                            • Part of subcall function 0048A8CA: SelectObject.GDI32(?,00000000), ref: 0048A964
                                                            • Part of subcall function 0048A8CA: SetBkColor.GDI32(?,00000000), ref: 0048A96D
                                                            • Part of subcall function 0048A8CA: SelectObject.GDI32(?,?), ref: 0048A97A
                                                            • Part of subcall function 0048A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0048A999
                                                            • Part of subcall function 0048A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0048A9B0
                                                            • Part of subcall function 0048A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0048A9C5
                                                            • Part of subcall function 0048A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0048A9ED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 3521893082-0
                                                          • Opcode ID: e63ce8fecf4f6123c3b51ac2f84dd81aff37f56c992807b035cdd3e2728beed2
                                                          • Instruction ID: fb34620bd59db4fe0d00bba54468f49f6ea6f7247eb536f08ce7ecc3d6e9d283
                                                          • Opcode Fuzzy Hash: e63ce8fecf4f6123c3b51ac2f84dd81aff37f56c992807b035cdd3e2728beed2
                                                          • Instruction Fuzzy Hash: 5E917D72408301BFD710AF64DC08A5F7BA9FB89321F100F2EF962961A1D774D949CB5A
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?), ref: 00402CA2
                                                          • DeleteObject.GDI32(00000000), ref: 00402CE8
                                                          • DeleteObject.GDI32(00000000), ref: 00402CF3
                                                          • DestroyIcon.USER32(00000000,?,?,?), ref: 00402CFE
                                                          • DestroyWindow.USER32(00000000,?,?,?), ref: 00402D09
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 0043C43B
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0043C474
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0043C89D
                                                            • Part of subcall function 00401B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00402036,?,00000000,?,?,?,?,004016CB,00000000,?), ref: 00401B9A
                                                          • SendMessageW.USER32(?,00001053), ref: 0043C8DA
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0043C8F1
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0043C907
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0043C912
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                          • String ID: 0
                                                          • API String ID: 464785882-4108050209
                                                          • Opcode ID: 4375e54c2866febaad8ffc9ac244cdd1ac029a08f3163fb11202e14e0822a081
                                                          • Instruction ID: 2a922f2165ff82378a3b73503dcd1cf133edd61f128b8a365017e979e5fddc8b
                                                          • Opcode Fuzzy Hash: 4375e54c2866febaad8ffc9ac244cdd1ac029a08f3163fb11202e14e0822a081
                                                          • Instruction Fuzzy Hash: E112BF30604211EFDB15DF24C988BAAB7E1BF08304F54557EE855EB2A2C779E842CF99
                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 004774DE
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0047759D
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004775DB
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 004775ED
                                                          • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00477633
                                                          • GetClientRect.USER32(00000000,?), ref: 0047763F
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00477683
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00477692
                                                          • GetStockObject.GDI32(00000011), ref: 004776A2
                                                          • SelectObject.GDI32(00000000,00000000), ref: 004776A6
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 004776B6
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004776BF
                                                          • DeleteDC.GDI32(00000000), ref: 004776C8
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004776F4
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 0047770B
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00477746
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0047775A
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 0047776B
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0047779B
                                                          • GetStockObject.GDI32(00000011), ref: 004777A6
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 004777B1
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 004777BB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: 06145267f47237950f9bf2b394788d14c0e7c77fc12a147c01bfcfc54d464a41
                                                          • Instruction ID: a65668349d9d90c20bc2e89cb33f711f17b366ce89c6f6fccfd6c75f405f0b1e
                                                          • Opcode Fuzzy Hash: 06145267f47237950f9bf2b394788d14c0e7c77fc12a147c01bfcfc54d464a41
                                                          • Instruction Fuzzy Hash: C2A18371A00605BFEB14DBA4DC49FAE7BB9EB04714F008129FA14A72E1C774AD44CB68
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0046AD1E
                                                          • GetDriveTypeW.KERNEL32(?,0048FAC0,?,\\.\,0048F910), ref: 0046ADFB
                                                          • SetErrorMode.KERNEL32(00000000,0048FAC0,?,\\.\,0048F910), ref: 0046AF59
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: 7b77267de8c71d2cda51ee6c507caa4ba89c237b7189c85e33c2ab5589f655bd
                                                          • Instruction ID: e912c7b3330773d5b9bf2588ba7fbd63f6bfe130c5f6eb3342ce3002eb002758
                                                          • Opcode Fuzzy Hash: 7b77267de8c71d2cda51ee6c507caa4ba89c237b7189c85e33c2ab5589f655bd
                                                          • Instruction Fuzzy Hash: 2E5186B0648A059ACB04DB61C942DBE73A5EF48708730446FF406B7291EA3DAD62DF5F
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 1038674560-86951937
                                                          • Opcode ID: c2cb4ceb81a9fb86b22fb91a037a826352b5ec73775e3533fd93c245e235c0fa
                                                          • Instruction ID: cb422ad940ebd99c4cbaeb9a9904d1c86e4c1b178c3cf2ebe63a60ccd5d4c750
                                                          • Opcode Fuzzy Hash: c2cb4ceb81a9fb86b22fb91a037a826352b5ec73775e3533fd93c245e235c0fa
                                                          • Instruction Fuzzy Hash: 3281E3B07002156ADF10BA62EC42FAB3768AF15704F14403BF9067A1C2EB7CDA55C66D
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 0048A903
                                                          • SetTextColor.GDI32(?,?), ref: 0048A907
                                                          • GetSysColorBrush.USER32(0000000F), ref: 0048A91D
                                                          • GetSysColor.USER32(0000000F), ref: 0048A928
                                                          • CreateSolidBrush.GDI32(?), ref: 0048A92D
                                                          • GetSysColor.USER32(00000011), ref: 0048A945
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0048A953
                                                          • SelectObject.GDI32(?,00000000), ref: 0048A964
                                                          • SetBkColor.GDI32(?,00000000), ref: 0048A96D
                                                          • SelectObject.GDI32(?,?), ref: 0048A97A
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 0048A999
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0048A9B0
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 0048A9C5
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0048A9ED
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0048AA14
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 0048AA32
                                                          • DrawFocusRect.USER32(?,?), ref: 0048AA3D
                                                          • GetSysColor.USER32(00000011), ref: 0048AA4B
                                                          • SetTextColor.GDI32(?,00000000), ref: 0048AA53
                                                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0048AA67
                                                          • SelectObject.GDI32(?,0048A5FA), ref: 0048AA7E
                                                          • DeleteObject.GDI32(?), ref: 0048AA89
                                                          • SelectObject.GDI32(?,?), ref: 0048AA8F
                                                          • DeleteObject.GDI32(?), ref: 0048AA94
                                                          • SetTextColor.GDI32(?,?), ref: 0048AA9A
                                                          • SetBkColor.GDI32(?,?), ref: 0048AAA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: df27593039a2a3c6053042b7d9a2d22140a6caacc7a9282d6f0daff4a54aa358
                                                          • Instruction ID: 67910f5981194f54d32d2413a419bc6a22b5e02dd88e552ef27f67441b011758
                                                          • Opcode Fuzzy Hash: df27593039a2a3c6053042b7d9a2d22140a6caacc7a9282d6f0daff4a54aa358
                                                          • Instruction Fuzzy Hash: AD514F71901208FFDB10AFA4DC48EAE7B79EF08320F114A2AF911AB2A1D7759D54DF54
                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00488AC1
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00488AD2
                                                          • CharNextW.USER32(0000014E), ref: 00488B01
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00488B42
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00488B58
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00488B69
                                                          • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00488B86
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 00488BD8
                                                          • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00488BEE
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00488C1F
                                                          • _memset.LIBCMT ref: 00488C44
                                                          • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00488C8D
                                                          • _memset.LIBCMT ref: 00488CEC
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00488D16
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00488D6E
                                                          • SendMessageW.USER32(?,0000133D,?,?), ref: 00488E1B
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00488E3D
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00488E87
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00488EB4
                                                          • DrawMenuBar.USER32(?), ref: 00488EC3
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 00488EEB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                          • String ID: 0
                                                          • API String ID: 1073566785-4108050209
                                                          • Opcode ID: 620f0146723a92550614622863fc1dbb46bf9ceb3d6abe555e8fc84cca08bbc9
                                                          • Instruction ID: 787a5fb712104ee4b76f4ba17aa60975d6cacfa81cf9944a1fa1b3bb2a4fb8ea
                                                          • Opcode Fuzzy Hash: 620f0146723a92550614622863fc1dbb46bf9ceb3d6abe555e8fc84cca08bbc9
                                                          • Instruction Fuzzy Hash: 44E1B370900218AFDB20AF51CC84EEF7BB9EF04710F50456FFA15AA290DB789985DF69
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 004849CA
                                                          • GetDesktopWindow.USER32 ref: 004849DF
                                                          • GetWindowRect.USER32(00000000), ref: 004849E6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00484A48
                                                          • DestroyWindow.USER32(?), ref: 00484A74
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00484A9D
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00484ABB
                                                          • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00484AE1
                                                          • SendMessageW.USER32(?,00000421,?,?), ref: 00484AF6
                                                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00484B09
                                                          • IsWindowVisible.USER32(?), ref: 00484B29
                                                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00484B44
                                                          • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00484B58
                                                          • GetWindowRect.USER32(?,?), ref: 00484B70
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00484B96
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 00484BB0
                                                          • CopyRect.USER32(?,?), ref: 00484BC7
                                                          • SendMessageW.USER32(?,00000412,00000000), ref: 00484C32
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: 943f141a24a5701e169943524c067f38581a5f413d5e7729d13daee1db30ced1
                                                          • Instruction ID: 71fd3677379c23cac636b4aadb2286f0fe2b453109396d863f09e4e9c2446b6d
                                                          • Opcode Fuzzy Hash: 943f141a24a5701e169943524c067f38581a5f413d5e7729d13daee1db30ced1
                                                          • Instruction Fuzzy Hash: EFB15971604341AFDB04EF65C844A6FBBE4BF88314F008A2EF999AB291D775EC05CB59
                                                          APIs
                                                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 004644AC
                                                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 004644D2
                                                          • _wcscpy.LIBCMT ref: 00464500
                                                          • _wcscmp.LIBCMT ref: 0046450B
                                                          • _wcscat.LIBCMT ref: 00464521
                                                          • _wcsstr.LIBCMT ref: 0046452C
                                                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00464548
                                                          • _wcscat.LIBCMT ref: 00464591
                                                          • _wcscat.LIBCMT ref: 00464598
                                                          • _wcsncpy.LIBCMT ref: 004645C3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                          • API String ID: 699586101-1459072770
                                                          • Opcode ID: 60d8f0236dceb86cc4fe81d47a0c18702099690fb3891d08ba0090958bb9e406
                                                          • Instruction ID: 2b480a1fb6a64e9c247c6b56b60e40bdc72f3d5a191167641815a527c939035c
                                                          • Opcode Fuzzy Hash: 60d8f0236dceb86cc4fe81d47a0c18702099690fb3891d08ba0090958bb9e406
                                                          • Instruction Fuzzy Hash: 7641D431A002107BDB14BA75AC43FBF77ACDF81714F50046FF905A6182FA7C9A4296AE
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004028BC
                                                          • GetSystemMetrics.USER32(00000007), ref: 004028C4
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004028EF
                                                          • GetSystemMetrics.USER32(00000008), ref: 004028F7
                                                          • GetSystemMetrics.USER32(00000004), ref: 0040291C
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00402939
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00402949
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0040297C
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00402990
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 004029AE
                                                          • GetStockObject.GDI32(00000011), ref: 004029CA
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 004029D5
                                                            • Part of subcall function 00402344: GetCursorPos.USER32(?), ref: 00402357
                                                            • Part of subcall function 00402344: ScreenToClient.USER32(004C57B0,?), ref: 00402374
                                                            • Part of subcall function 00402344: GetAsyncKeyState.USER32(00000001), ref: 00402399
                                                            • Part of subcall function 00402344: GetAsyncKeyState.USER32(00000002), ref: 004023A7
                                                          • SetTimer.USER32(00000000,00000000,00000028,00401256), ref: 004029FC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI
                                                          • API String ID: 1458621304-248962490
                                                          • Opcode ID: df8829e052d7c40840cee99ca6260df0de385842cec2d42fdc9bfdfb12db4f5c
                                                          • Instruction ID: a18fd751d40b92a0f9ce74f9a4650c687106778ef47aaf7a4e9f1722fdb5861d
                                                          • Opcode Fuzzy Hash: df8829e052d7c40840cee99ca6260df0de385842cec2d42fdc9bfdfb12db4f5c
                                                          • Instruction Fuzzy Hash: 8AB15075600209EFDB14EFA8DD49BAE77B4FB08314F10463AFA15A62D0DB78A851CB58
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 0045A47A
                                                          • __swprintf.LIBCMT ref: 0045A51B
                                                          • _wcscmp.LIBCMT ref: 0045A52E
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0045A583
                                                          • _wcscmp.LIBCMT ref: 0045A5BF
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 0045A5F6
                                                          • GetDlgCtrlID.USER32(?), ref: 0045A648
                                                          • GetWindowRect.USER32(?,?), ref: 0045A67E
                                                          • GetParent.USER32(?), ref: 0045A69C
                                                          • ScreenToClient.USER32(00000000), ref: 0045A6A3
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 0045A71D
                                                          • _wcscmp.LIBCMT ref: 0045A731
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 0045A757
                                                          • _wcscmp.LIBCMT ref: 0045A76B
                                                            • Part of subcall function 0042362C: _iswctype.LIBCMT ref: 00423634
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                          • String ID: %s%u
                                                          • API String ID: 3744389584-679674701
                                                          • Opcode ID: 70582c53a74fb19ef89f66ee8ee48de01d33c33058aefc90aeee9439ab50311f
                                                          • Instruction ID: eb4c2c17bfd361fdb29ac4d9e78bc58de04dd0089fb3858937583b9ed20721cb
                                                          • Opcode Fuzzy Hash: 70582c53a74fb19ef89f66ee8ee48de01d33c33058aefc90aeee9439ab50311f
                                                          • Instruction Fuzzy Hash: 06A1B431204606BFD714DF60C884BABB7E8FF44316F04462AFD99D2251D738E969CB9A
                                                          APIs
                                                          • GetClassNameW.USER32(00000008,?,00000400), ref: 0045AF18
                                                          • _wcscmp.LIBCMT ref: 0045AF29
                                                          • GetWindowTextW.USER32(00000001,?,00000400), ref: 0045AF51
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 0045AF6E
                                                          • _wcscmp.LIBCMT ref: 0045AF8C
                                                          • _wcsstr.LIBCMT ref: 0045AF9D
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 0045AFD5
                                                          • _wcscmp.LIBCMT ref: 0045AFE5
                                                          • GetWindowTextW.USER32(00000002,?,00000400), ref: 0045B00C
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 0045B055
                                                          • _wcscmp.LIBCMT ref: 0045B065
                                                          • GetClassNameW.USER32(00000010,?,00000400), ref: 0045B08D
                                                          • GetWindowRect.USER32(00000004,?), ref: 0045B0F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                          • String ID: @$ThumbnailClass
                                                          • API String ID: 1788623398-1539354611
                                                          • Opcode ID: 020363660ca7d71f34756f1623f4acd369a1d6cd1f29e6ae8ac33c2e96e31edf
                                                          • Instruction ID: 2113ca19c953e4d0fb0a3bed3b629d6a09082ecb25fab152276a3acc7fd757eb
                                                          • Opcode Fuzzy Hash: 020363660ca7d71f34756f1623f4acd369a1d6cd1f29e6ae8ac33c2e96e31edf
                                                          • Instruction Fuzzy Hash: BD81CF711082059BDB00DF11C881BAB77E8EF4075AF14856FFD859A192DB38DD4DCBAA
                                                          APIs
                                                            • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                          • DragQueryPoint.SHELL32(?,?), ref: 0048C627
                                                            • Part of subcall function 0048AB37: ClientToScreen.USER32(?,?), ref: 0048AB60
                                                            • Part of subcall function 0048AB37: GetWindowRect.USER32(?,?), ref: 0048ABD6
                                                            • Part of subcall function 0048AB37: PtInRect.USER32(?,?,0048C014), ref: 0048ABE6
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 0048C690
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0048C69B
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0048C6BE
                                                          • _wcscat.LIBCMT ref: 0048C6EE
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0048C705
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 0048C71E
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 0048C735
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 0048C757
                                                          • DragFinish.SHELL32(?), ref: 0048C75E
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0048C851
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pbL
                                                          • API String ID: 169749273-3863044002
                                                          • Opcode ID: ff19a083962564101d0b0bee14167f2d37b8cd78877080f1dcf00369c6d7ebf7
                                                          • Instruction ID: 4fadb8ae9d86136d60326728fb0320be203031e120dd753c2ba31efb77555f42
                                                          • Opcode Fuzzy Hash: ff19a083962564101d0b0bee14167f2d37b8cd78877080f1dcf00369c6d7ebf7
                                                          • Instruction Fuzzy Hash: 1B617F71108300AFC701EF65CC85D9FBBE8EF88714F50092EF591A22A1DB74A949CB6A
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                          • API String ID: 1038674560-1810252412
                                                          • Opcode ID: 52f89f39c4f5c5e735f1cd86a92d30baad3c4cbecdefe61fa6aede404be9d37c
                                                          • Instruction ID: cc55e2bc6580523fe6938d14c256d65c14dee3a36fa7a852f9c3cef8ae364549
                                                          • Opcode Fuzzy Hash: 52f89f39c4f5c5e735f1cd86a92d30baad3c4cbecdefe61fa6aede404be9d37c
                                                          • Instruction Fuzzy Hash: 2C31A370A48209AADB01EA61DE43FEE7774AF14719F60052FB801711D2EB6D6F18C56E
                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 00475013
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 0047501E
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 00475029
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00475034
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 0047503F
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 0047504A
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 00475055
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 00475060
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 0047506B
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 00475076
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 00475081
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 0047508C
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 00475097
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 004750A2
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 004750AD
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 004750B8
                                                          • GetCursorInfo.USER32(?), ref: 004750C8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$Info
                                                          • String ID:
                                                          • API String ID: 2577412497-0
                                                          • Opcode ID: fe88967af424c1f4c9ae994d1dca842c12f2ee5cef9159fe2d10a3b622c76547
                                                          • Instruction ID: d5c7a2001707235dd9e126089dd3671015cbda4ea0a9ffae781a460d29ca5a6d
                                                          • Opcode Fuzzy Hash: fe88967af424c1f4c9ae994d1dca842c12f2ee5cef9159fe2d10a3b622c76547
                                                          • Instruction Fuzzy Hash: 7F3114B1D083196ADF109FB68C8999FBFE8FF04750F50453BA50DEB281DA7865048F95
                                                          APIs
                                                          • _memset.LIBCMT ref: 0048A259
                                                          • DestroyWindow.USER32(?,?), ref: 0048A2D3
                                                            • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0048A34D
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0048A36F
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0048A382
                                                          • DestroyWindow.USER32(00000000), ref: 0048A3A4
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0048A3DB
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0048A3F4
                                                          • GetDesktopWindow.USER32 ref: 0048A40D
                                                          • GetWindowRect.USER32(00000000), ref: 0048A414
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0048A42C
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0048A444
                                                            • Part of subcall function 004025DB: GetWindowLongW.USER32(?,000000EB), ref: 004025EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 1297703922-3619404913
                                                          • Opcode ID: ad7f984ea1cd4845daa69472354c2a8f15b860bce95c98789d10b07fca09f9c0
                                                          • Instruction ID: 021702ee8d535e162beb7c83f4b22bae82635ac61efe1e234d944cc96a30802f
                                                          • Opcode Fuzzy Hash: ad7f984ea1cd4845daa69472354c2a8f15b860bce95c98789d10b07fca09f9c0
                                                          • Instruction Fuzzy Hash: CE719270141204AFE721DF18CC49F6B77E5FB88704F04492EF985972A0D7B8E956CB6A
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00484424
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0048446F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: BuffCharMessageSendUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 3974292440-4258414348
                                                          • Opcode ID: 8551f69f223e5bdeac0c783f2c4a73df6d5f98841a83c573d89b7fb24d6da8d4
                                                          • Instruction ID: 284482c989e2c3ea33895925bad2fd62e2b6eb619b8524f2c72ddc2562c3458e
                                                          • Opcode Fuzzy Hash: 8551f69f223e5bdeac0c783f2c4a73df6d5f98841a83c573d89b7fb24d6da8d4
                                                          • Instruction Fuzzy Hash: BF917F712043119BCB04FF11C451A6EB7E1AF95358F44886EF8966B3A3DB38ED0ACB59
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0048B8B4
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,004891C2), ref: 0048B910
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0048B949
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0048B98C
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0048B9C3
                                                          • FreeLibrary.KERNEL32(?), ref: 0048B9CF
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0048B9DF
                                                          • DestroyIcon.USER32(?,?,?,?,?,004891C2), ref: 0048B9EE
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0048BA0B
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0048BA17
                                                            • Part of subcall function 00422EFD: __wcsicmp_l.LIBCMT ref: 00422F86
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 1212759294-1154884017
                                                          • Opcode ID: 2fc131844969b4b5c283f9404ec8a9d49153947123385b136b1911b68efed916
                                                          • Instruction ID: 50163288b7a3e5e0cbad55d9f7afdff750af503695f4b02481751edd59ee4b0a
                                                          • Opcode Fuzzy Hash: 2fc131844969b4b5c283f9404ec8a9d49153947123385b136b1911b68efed916
                                                          • Instruction Fuzzy Hash: CC61F2B1900215BEEB14EF65DC41FBF7BA8FB08710F10491AF915D62C1DBB8A984DBA4
                                                          APIs
                                                            • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                            • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                          • CharLowerBuffW.USER32(?,?), ref: 0046A3CB
                                                          • GetDriveTypeW.KERNEL32 ref: 0046A418
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046A460
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046A497
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046A4C5
                                                            • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 2698844021-4113822522
                                                          • Opcode ID: 7219c61cc9b188b714514c11cc18a48e6f3d8230eed7d6a51d534ace4fdd7166
                                                          • Instruction ID: 3713139b98a23bb0435d921a878e050fdb512fde8566727adc807e41ed5eba46
                                                          • Opcode Fuzzy Hash: 7219c61cc9b188b714514c11cc18a48e6f3d8230eed7d6a51d534ace4fdd7166
                                                          • Instruction Fuzzy Hash: F7515EB15146049FC700EF11C88196BB7E8EF94718F10886EF89967292DB39ED0ACF5A
                                                          APIs
                                                          • __wsplitpath.LIBCMT ref: 0046DA10
                                                          • _wcscat.LIBCMT ref: 0046DA28
                                                          • _wcscat.LIBCMT ref: 0046DA3A
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0046DA4F
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0046DA63
                                                          • GetFileAttributesW.KERNEL32(?), ref: 0046DA7B
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 0046DA95
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0046DAA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                          • String ID: *.*
                                                          • API String ID: 34673085-438819550
                                                          • Opcode ID: fa1f45a871fde2c366193a2ba591cd779a7d7abb513180d0bc3df0c630a8fc5b
                                                          • Instruction ID: 3a96bfa05d70ac0d448354448300b44f57ebebe42a7fb519914baabb83a09890
                                                          • Opcode Fuzzy Hash: fa1f45a871fde2c366193a2ba591cd779a7d7abb513180d0bc3df0c630a8fc5b
                                                          • Instruction Fuzzy Hash: 128182B1E042419FCB24EF65C84496BB7E4AF89314F18882FF889D7351E638D949CB57
                                                          APIs
                                                            • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0048C1FC
                                                          • GetFocus.USER32 ref: 0048C20C
                                                          • GetDlgCtrlID.USER32(00000000), ref: 0048C217
                                                          • _memset.LIBCMT ref: 0048C342
                                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0048C36D
                                                          • GetMenuItemCount.USER32(?), ref: 0048C38D
                                                          • GetMenuItemID.USER32(?,00000000), ref: 0048C3A0
                                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0048C3D4
                                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0048C41C
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0048C454
                                                          • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0048C489
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                          • String ID: 0
                                                          • API String ID: 1296962147-4108050209
                                                          • Opcode ID: ce5e6c59ea7fb5ab1743ea8bb712758aa64d10e9b8e324f092fc3c417088826e
                                                          • Instruction ID: c475bcefc4ba02209658d373736a3052ec3262963195f5d7aee57ef1aaf8ece4
                                                          • Opcode Fuzzy Hash: ce5e6c59ea7fb5ab1743ea8bb712758aa64d10e9b8e324f092fc3c417088826e
                                                          • Instruction Fuzzy Hash: 17818870608301AFD710EF24D894A7FBBE8EB88714F004D2EF99597291D778D945CBAA
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 0047738F
                                                          • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0047739B
                                                          • CreateCompatibleDC.GDI32(?), ref: 004773A7
                                                          • SelectObject.GDI32(00000000,?), ref: 004773B4
                                                          • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00477408
                                                          • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00477444
                                                          • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00477468
                                                          • SelectObject.GDI32(00000006,?), ref: 00477470
                                                          • DeleteObject.GDI32(?), ref: 00477479
                                                          • DeleteDC.GDI32(00000006), ref: 00477480
                                                          • ReleaseDC.USER32(00000000,?), ref: 0047748B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: 27e44d1a4b232d095fbb868b1d036b2ec87e1731ca553e17d43f82b721b1af9e
                                                          • Instruction ID: dfe8a3419fea5eebfe22a8fe4a62b6ec684acb784746aa6277c3acce6f7982dd
                                                          • Opcode Fuzzy Hash: 27e44d1a4b232d095fbb868b1d036b2ec87e1731ca553e17d43f82b721b1af9e
                                                          • Instruction Fuzzy Hash: 5D515871904209EFCB14CFA8CC84EAFBBB9EF49310F14852EF959A7211D735A945CB54
                                                          APIs
                                                            • Part of subcall function 00420957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00406B0C,?,00008000), ref: 00420973
                                                            • Part of subcall function 00404750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00404743,?,?,004037AE,?), ref: 00404770
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00406BAD
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00406CFA
                                                            • Part of subcall function 0040586D: _wcscpy.LIBCMT ref: 004058A5
                                                            • Part of subcall function 0042363D: _iswctype.LIBCMT ref: 00423645
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                          • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                          • API String ID: 537147316-1018226102
                                                          • Opcode ID: d4bf3eeb06dfc1058760e58eca58f3c86f72bdeb815fc5d753a09aae0dbe2645
                                                          • Instruction ID: 136c1bde332718f4234bbb9892b60201bfb37e26dd96c6a9a3310cb901d73b7e
                                                          • Opcode Fuzzy Hash: d4bf3eeb06dfc1058760e58eca58f3c86f72bdeb815fc5d753a09aae0dbe2645
                                                          • Instruction Fuzzy Hash: 2C027D701083419FC714EF25C8419AFBBE5EF98318F54492FF486A72A2DB38D949CB5A
                                                          APIs
                                                          • _memset.LIBCMT ref: 00462D50
                                                          • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00462DDD
                                                          • GetMenuItemCount.USER32(004C5890), ref: 00462E66
                                                          • DeleteMenu.USER32(004C5890,00000005,00000000,000000F5,?,?), ref: 00462EF6
                                                          • DeleteMenu.USER32(004C5890,00000004,00000000), ref: 00462EFE
                                                          • DeleteMenu.USER32(004C5890,00000006,00000000), ref: 00462F06
                                                          • DeleteMenu.USER32(004C5890,00000003,00000000), ref: 00462F0E
                                                          • GetMenuItemCount.USER32(004C5890), ref: 00462F16
                                                          • SetMenuItemInfoW.USER32(004C5890,00000004,00000000,00000030), ref: 00462F4C
                                                          • GetCursorPos.USER32(?), ref: 00462F56
                                                          • SetForegroundWindow.USER32(00000000), ref: 00462F5F
                                                          • TrackPopupMenuEx.USER32(004C5890,00000000,?,00000000,00000000,00000000), ref: 00462F72
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00462F7E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                          • String ID:
                                                          • API String ID: 3993528054-0
                                                          • Opcode ID: 68d6ff921564c39c8709aecc737d134abe6a2587159ab4d14f70d8f79111516a
                                                          • Instruction ID: dec7b0e441c84a99d0ab23afc077d39fee676e6f9a2472c44709d087c22ecc3a
                                                          • Opcode Fuzzy Hash: 68d6ff921564c39c8709aecc737d134abe6a2587159ab4d14f70d8f79111516a
                                                          • Instruction Fuzzy Hash: AB71F670601A05BBEB219F54DD49FAABF64FF04314F10022BF615AA2E1D7FA5C10DB5A
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 004788D7
                                                          • CoInitialize.OLE32(00000000), ref: 00478904
                                                          • CoUninitialize.OLE32 ref: 0047890E
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00478A0E
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00478B3B
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00492C0C), ref: 00478B6F
                                                          • CoGetObject.OLE32(?,00000000,00492C0C,?), ref: 00478B92
                                                          • SetErrorMode.KERNEL32(00000000), ref: 00478BA5
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00478C25
                                                          • VariantClear.OLEAUT32(?), ref: 00478C35
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                          • String ID: ,,I
                                                          • API String ID: 2395222682-4163367948
                                                          • Opcode ID: 86113d1df25df9381713289ea4cd204886f45ef52b39823f92184825a9a21490
                                                          • Instruction ID: aabbb54c80bb5556d5779205c7c98f5c8569651e4766cb9ae3be61758569f7e0
                                                          • Opcode Fuzzy Hash: 86113d1df25df9381713289ea4cd204886f45ef52b39823f92184825a9a21490
                                                          • Instruction Fuzzy Hash: 33C138B1604305AFC700DF25C88896BB7E9FF89348F00896EF9899B251DB75ED05CB56
                                                          APIs
                                                            • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                          • _memset.LIBCMT ref: 0045786B
                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004578A0
                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 004578BC
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 004578D8
                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00457902
                                                          • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0045792A
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00457935
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0045793A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                          • API String ID: 1411258926-22481851
                                                          • Opcode ID: 77803e0cf30d0c6a9af00fa7a29df62c406b8a667e1daf005490fda91c829b3b
                                                          • Instruction ID: bd842348e8c291230e2108f9814d7b32575dde29d3ae902d03d2cd9f0e66d559
                                                          • Opcode Fuzzy Hash: 77803e0cf30d0c6a9af00fa7a29df62c406b8a667e1daf005490fda91c829b3b
                                                          • Instruction Fuzzy Hash: 3F41FB72C14129AADF11EBA5DC85DEEB778FF04314F40447AE905B22A1DB396D08CBA8
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 3964851224-909552448
                                                          • Opcode ID: a4df75a5d1017b7a8f535d2451c159b81df183318fde1907aaf5dc5abb7e2787
                                                          • Instruction ID: 987af29362f030b9785e67816bde092fa47ad23058dcaf1b7a905610e89cab94
                                                          • Opcode Fuzzy Hash: a4df75a5d1017b7a8f535d2451c159b81df183318fde1907aaf5dc5abb7e2787
                                                          • Instruction Fuzzy Hash: 3C4183312142598BCF60FF11D891AEF3760AF21308F94882BFE5517292D77C9D1ACB69
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0043E2A0,00000010,?,Bad directive syntax error,0048F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0045F7C2
                                                          • LoadStringW.USER32(00000000,?,0043E2A0,00000010), ref: 0045F7C9
                                                            • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                          • _wprintf.LIBCMT ref: 0045F7FC
                                                          • __swprintf.LIBCMT ref: 0045F81E
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0045F88D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 1506413516-4153970271
                                                          • Opcode ID: b0a5f66eebad9f36124e6602567880734addc3d43cd627ae7dde5d3f4a6a6943
                                                          • Instruction ID: b323f88afb297f8589dfe01482fd0210897c7bceeb753686804773940a61526b
                                                          • Opcode Fuzzy Hash: b0a5f66eebad9f36124e6602567880734addc3d43cd627ae7dde5d3f4a6a6943
                                                          • Instruction Fuzzy Hash: 33215071904219BBCF11EF91CC0AEEE7739BF14309F04087BB515750A2EA39AA18DB59
                                                          APIs
                                                            • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                            • Part of subcall function 00407924: _memmove.LIBCMT ref: 004079AD
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00465330
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00465346
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00465357
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00465369
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0046537A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: SendString$_memmove
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2279737902-1007645807
                                                          • Opcode ID: a38f690a41644a1ea6aaaa90d6ed946eea0a1c3052881e4aa48fec53c4da1104
                                                          • Instruction ID: 2e8e5f898991f968bbba2f693440f846553d5b5edaf37d24830f39f112612e90
                                                          • Opcode Fuzzy Hash: a38f690a41644a1ea6aaaa90d6ed946eea0a1c3052881e4aa48fec53c4da1104
                                                          • Instruction Fuzzy Hash: CE119370D5015979D720B662CC49EFF7B7CEB91B48F10042F7801A21D1EDB81D45C6BA
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 208665112-3771769585
                                                          • Opcode ID: cbe6a9854f2a8758ac6b0ec3204168094a3fc6117155a8b4d2da0760867b373f
                                                          • Instruction ID: ae08325a14d93a890b1fa528d308863361f072a57d3f479d6846efdaae1a579c
                                                          • Opcode Fuzzy Hash: cbe6a9854f2a8758ac6b0ec3204168094a3fc6117155a8b4d2da0760867b373f
                                                          • Instruction Fuzzy Hash: BD11F331600114AFDB10AB70AC46EDE77ACEB41716F5405BFF44592191FF7889858B5A
                                                          APIs
                                                          • timeGetTime.WINMM ref: 00464F7A
                                                            • Part of subcall function 0042049F: timeGetTime.WINMM(?,75A4B400,00410E7B), ref: 004204A3
                                                          • Sleep.KERNEL32(0000000A), ref: 00464FA6
                                                          • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00464FCA
                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00464FEC
                                                          • SetActiveWindow.USER32 ref: 0046500B
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00465019
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00465038
                                                          • Sleep.KERNEL32(000000FA), ref: 00465043
                                                          • IsWindow.USER32 ref: 0046504F
                                                          • EndDialog.USER32(00000000), ref: 00465060
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: 8774e4f041890dbc2a91042b0544c15fbc059514b46ccdf9cc1dd7305ce15ae1
                                                          • Instruction ID: 17ca608856519cd1955488b4f204772d3e00e2da9bda675b1abbe090807247ff
                                                          • Opcode Fuzzy Hash: 8774e4f041890dbc2a91042b0544c15fbc059514b46ccdf9cc1dd7305ce15ae1
                                                          • Instruction Fuzzy Hash: A521A174200605BFEB505F60FC88F2A3BA9EB44749F25543EF102922B1EB758D549B6F
                                                          APIs
                                                            • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                            • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                          • CoInitialize.OLE32(00000000), ref: 0046D5EA
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0046D67D
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 0046D691
                                                          • CoCreateInstance.OLE32(00492D7C,00000000,00000001,004B8C1C,?), ref: 0046D6DD
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0046D74C
                                                          • CoTaskMemFree.OLE32(?,?), ref: 0046D7A4
                                                          • _memset.LIBCMT ref: 0046D7E1
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 0046D81D
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0046D840
                                                          • CoTaskMemFree.OLE32(00000000), ref: 0046D847
                                                          • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0046D87E
                                                          • CoUninitialize.OLE32(00000001,00000000), ref: 0046D880
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                          • String ID:
                                                          • API String ID: 1246142700-0
                                                          • Opcode ID: df310d87e4c66fd61e1bd5e69a727a67aed3a0423001bed2a55539e5496fe644
                                                          • Instruction ID: f865a34610966cb3ccb6f29414af5a3955dc884533e4df89e7e1a7976a3b9bcc
                                                          • Opcode Fuzzy Hash: df310d87e4c66fd61e1bd5e69a727a67aed3a0423001bed2a55539e5496fe644
                                                          • Instruction Fuzzy Hash: 39B11B75A00109AFDB04DFA5C888DAEBBB9FF48314F10846AF909EB261DB34ED45CB55
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 0045C283
                                                          • GetWindowRect.USER32(00000000,?), ref: 0045C295
                                                          • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0045C2F3
                                                          • GetDlgItem.USER32(?,00000002), ref: 0045C2FE
                                                          • GetWindowRect.USER32(00000000,?), ref: 0045C310
                                                          • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0045C364
                                                          • GetDlgItem.USER32(?,000003E9), ref: 0045C372
                                                          • GetWindowRect.USER32(00000000,?), ref: 0045C383
                                                          • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0045C3C6
                                                          • GetDlgItem.USER32(?,000003EA), ref: 0045C3D4
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0045C3F1
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0045C3FE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: ee900cb0418c209eff2971d5848f65fb009066793c70c2948a602d6ec38bc7ab
                                                          • Instruction ID: 11649da17df5d0755d73b9da25d5b781727aa351e01af551b5c423be9c7c6dfa
                                                          • Opcode Fuzzy Hash: ee900cb0418c209eff2971d5848f65fb009066793c70c2948a602d6ec38bc7ab
                                                          • Instruction Fuzzy Hash: 62517071B00305AFDB08CFA9DD89AAEBBB6EB88311F14853DF915E7291D7709D448B14
                                                          APIs
                                                            • Part of subcall function 00401B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00402036,?,00000000,?,?,?,?,004016CB,00000000,?), ref: 00401B9A
                                                          • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 004020D3
                                                          • KillTimer.USER32(-00000001,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0040216E
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 0043BCA6
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0043BCD7
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0043BCEE
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0043BD0A
                                                          • DeleteObject.GDI32(00000000), ref: 0043BD1C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: 1fe7eb120fb530a9d0c3e86e2d255934ae6300064fd6ce35022d9647bea66392
                                                          • Instruction ID: edfb5b42e1aee2da2af7767ce8276f4fdeab99f29820ea46fc720bac3244b47a
                                                          • Opcode Fuzzy Hash: 1fe7eb120fb530a9d0c3e86e2d255934ae6300064fd6ce35022d9647bea66392
                                                          • Instruction Fuzzy Hash: B0617E34101B10DFD735AF14CA48B2A77F1FB44316F50943EE642AAAE0C7B8A891DB99
                                                          APIs
                                                            • Part of subcall function 004025DB: GetWindowLongW.USER32(?,000000EB), ref: 004025EC
                                                          • GetSysColor.USER32(0000000F), ref: 004021D3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: c544c20de1596d8a35e8bd9b7102db0368e0aafd3e371b07eaad61ce13d863f6
                                                          • Instruction ID: b625a7fc61febfd2c935065ad26fa2a4911c749eaed189314b0e0014d1ee1d2c
                                                          • Opcode Fuzzy Hash: c544c20de1596d8a35e8bd9b7102db0368e0aafd3e371b07eaad61ce13d863f6
                                                          • Instruction Fuzzy Hash: 0B41E531000100EFDB215F68DC8CBBA3B65EB46331F1442BAFE619A2E1C7758C86DB69
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,0048F910), ref: 0046A90B
                                                          • GetDriveTypeW.KERNEL32(00000061,004B89A0,00000061), ref: 0046A9D5
                                                          • _wcscpy.LIBCMT ref: 0046A9FF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: BuffCharDriveLowerType_wcscpy
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2820617543-1000479233
                                                          • Opcode ID: 556639d0dcd09af84e262d548350a2ad112727df3badb39c837963bed888a9a7
                                                          • Instruction ID: 63d5a068ad5a56aba220708db6a6aa365c702eef260e2cf9077a2f95fd26ae7a
                                                          • Opcode Fuzzy Hash: 556639d0dcd09af84e262d548350a2ad112727df3badb39c837963bed888a9a7
                                                          • Instruction Fuzzy Hash: 6751AE711183009BC700EF15C892AAFB7E5EF94308F544C2FF495672A2EB399D19CA5B
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: __i64tow__itow__swprintf
                                                          • String ID: %.15g$0x%p$False$True
                                                          • API String ID: 421087845-2263619337
                                                          • Opcode ID: 853849db72ab3f03b677a007e191688438c1d122d1ac365313169d74bc3e93e1
                                                          • Instruction ID: 743c89ec1be8f3b6cfe40c528e2526a533573b02274d3a1687b28713588ebf87
                                                          • Opcode Fuzzy Hash: 853849db72ab3f03b677a007e191688438c1d122d1ac365313169d74bc3e93e1
                                                          • Instruction Fuzzy Hash: AB41D772A10205AFDB24EF35D841A7673E8EF09304F20487FE549E6393EA3D9D068B19
                                                          APIs
                                                          • _memset.LIBCMT ref: 0048716A
                                                          • CreateMenu.USER32 ref: 00487185
                                                          • SetMenu.USER32(?,00000000), ref: 00487194
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00487221
                                                          • IsMenu.USER32(?), ref: 00487237
                                                          • CreatePopupMenu.USER32 ref: 00487241
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0048726E
                                                          • DrawMenuBar.USER32 ref: 00487276
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                          • String ID: 0$F
                                                          • API String ID: 176399719-3044882817
                                                          • Opcode ID: 8d361ed52167b8eab7a66d10bcbcea6876906ccdec482831028141534145e52f
                                                          • Instruction ID: ef621a00a8965f8f9a50d7f8a7e1c0e3a51c02c5d80a3ac9dc969039337b3b35
                                                          • Opcode Fuzzy Hash: 8d361ed52167b8eab7a66d10bcbcea6876906ccdec482831028141534145e52f
                                                          • Instruction Fuzzy Hash: 2A419B74A01204EFDB10EF64D898E9E7BB5FF09300F240469F915A7361D735A910DF98
                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0048755E
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00487565
                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00487578
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00487580
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 0048758B
                                                          • DeleteDC.GDI32(00000000), ref: 00487594
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 0048759E
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 004875B2
                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 004875BE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                          • String ID: static
                                                          • API String ID: 2559357485-2160076837
                                                          • Opcode ID: 2462904ef93fc367447b653beb19009bbb9b8e29659318a1c617b8df96e81b81
                                                          • Instruction ID: 1923f87f84a105141cc97cd4dfb73f9ea5de9f9edaf5dec82e4c1ac095da0f9d
                                                          • Opcode Fuzzy Hash: 2462904ef93fc367447b653beb19009bbb9b8e29659318a1c617b8df96e81b81
                                                          • Instruction Fuzzy Hash: FA316D72104214BBDF11AF64DC08FDF3BA9FF09364F210A29FA15A61A0D739D815DBA8
                                                          APIs
                                                          • _memset.LIBCMT ref: 00426E3E
                                                            • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                                          • __gmtime64_s.LIBCMT ref: 00426ED7
                                                          • __gmtime64_s.LIBCMT ref: 00426F0D
                                                          • __gmtime64_s.LIBCMT ref: 00426F2A
                                                          • __allrem.LIBCMT ref: 00426F80
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00426F9C
                                                          • __allrem.LIBCMT ref: 00426FB3
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00426FD1
                                                          • __allrem.LIBCMT ref: 00426FE8
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00427006
                                                          • __invoke_watson.LIBCMT ref: 00427077
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                          • String ID:
                                                          • API String ID: 384356119-0
                                                          • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                          • Instruction ID: cc18d51bddcb3bff235d9ba930da6ebb912618c2495e950f743dda1aeb2a8d13
                                                          • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                          • Instruction Fuzzy Hash: F8710876B00726ABD714AF79EC41B5BB3A4AF04328F55412FF514D7281EB78ED048B98
                                                          APIs
                                                          • _memset.LIBCMT ref: 00462542
                                                          • GetMenuItemInfoW.USER32(004C5890,000000FF,00000000,00000030), ref: 004625A3
                                                          • SetMenuItemInfoW.USER32(004C5890,00000004,00000000,00000030), ref: 004625D9
                                                          • Sleep.KERNEL32(000001F4), ref: 004625EB
                                                          • GetMenuItemCount.USER32(?), ref: 0046262F
                                                          • GetMenuItemID.USER32(?,00000000), ref: 0046264B
                                                          • GetMenuItemID.USER32(?,-00000001), ref: 00462675
                                                          • GetMenuItemID.USER32(?,?), ref: 004626BA
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00462700
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00462714
                                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00462735
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                          • String ID:
                                                          • API String ID: 4176008265-0
                                                          • Opcode ID: b0f46b9daa1905a6cfa597ce9f08befe4fcaea4ae8b00d429bdca1168be675da
                                                          • Instruction ID: d041e2a6511ad081bd824cff42eca7b157938f8ca15e77e0b80393dec237999e
                                                          • Opcode Fuzzy Hash: b0f46b9daa1905a6cfa597ce9f08befe4fcaea4ae8b00d429bdca1168be675da
                                                          • Instruction Fuzzy Hash: 3361B470900A49BFDB11CF64CE84DBF7BB8FB01345F14046AE842A7251E7B9AD05DB2A
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00486FA5
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00486FA8
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00486FCC
                                                          • _memset.LIBCMT ref: 00486FDD
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00486FEF
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00487067
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow_memset
                                                          • String ID:
                                                          • API String ID: 830647256-0
                                                          • Opcode ID: 4336d240a59bbb388c973f46f1178136a6457c7e14c292988be6c5ed4532a5ee
                                                          • Instruction ID: 7132dcb9391edd1f4fca7d59f8acd98ed1f58d557d43f29f177e0b8d5bde9df6
                                                          • Opcode Fuzzy Hash: 4336d240a59bbb388c973f46f1178136a6457c7e14c292988be6c5ed4532a5ee
                                                          • Instruction Fuzzy Hash: 17618E75900208AFDB10EFA4CC85EEE77B8EB09700F20056AFA14A73A1C775AD51DB64
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00456BBF
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 00456C18
                                                          • VariantInit.OLEAUT32(?), ref: 00456C2A
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00456C4A
                                                          • VariantCopy.OLEAUT32(?,?), ref: 00456C9D
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00456CB1
                                                          • VariantClear.OLEAUT32(?), ref: 00456CC6
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 00456CD3
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00456CDC
                                                          • VariantClear.OLEAUT32(?), ref: 00456CEE
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00456CF9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: f1379b8d06b3f903a5e910e956f09b0d2a9745292c14bd0cd64e072d7f41818e
                                                          • Instruction ID: 21fd5a8c16b11a42553d074c3324144f158a868588d4a73b9a3ed32873cef97c
                                                          • Opcode Fuzzy Hash: f1379b8d06b3f903a5e910e956f09b0d2a9745292c14bd0cd64e072d7f41818e
                                                          • Instruction Fuzzy Hash: F1418231A001199FCF00DFA9D8449AEBBB9EF18315F01847EE955E7362CB34A949CF94
                                                          APIs
                                                            • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                            • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                          • CoInitialize.OLE32 ref: 00478403
                                                          • CoUninitialize.OLE32 ref: 0047840E
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,00492BEC,?), ref: 0047846E
                                                          • IIDFromString.OLE32(?,?), ref: 004784E1
                                                          • VariantInit.OLEAUT32(?), ref: 0047857B
                                                          • VariantClear.OLEAUT32(?), ref: 004785DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 834269672-1287834457
                                                          • Opcode ID: c6f8ca96ce36d867b95c5300b034a7c5a4be955f287127c01fb95931614cda58
                                                          • Instruction ID: cb75df2b24e16c1c2e0b5d8d850f15e0fc33cba1d2aa6ec0deb68a9cf625d14d
                                                          • Opcode Fuzzy Hash: c6f8ca96ce36d867b95c5300b034a7c5a4be955f287127c01fb95931614cda58
                                                          • Instruction Fuzzy Hash: AA61C170648312AFC710DF14C848B9FB7E8AF44744F00881EF9899B291DB78ED48CB9A
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 00475793
                                                          • inet_addr.WSOCK32(?,?,?), ref: 004757D8
                                                          • gethostbyname.WSOCK32(?), ref: 004757E4
                                                          • IcmpCreateFile.IPHLPAPI ref: 004757F2
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00475862
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00475878
                                                          • IcmpCloseHandle.IPHLPAPI(00000000), ref: 004758ED
                                                          • WSACleanup.WSOCK32 ref: 004758F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: 8e94fae8daacd7abc9e052551fe7d87f54e2291b82163d083296b085216054c9
                                                          • Instruction ID: e00705f4e0379358c1930da5d1710ca1d0dba9501fb2cabd0d468b8ffa352f64
                                                          • Opcode Fuzzy Hash: 8e94fae8daacd7abc9e052551fe7d87f54e2291b82163d083296b085216054c9
                                                          • Instruction Fuzzy Hash: 08519F716006009FD710AF25DC45B6A77E4EF48714F05892EF95AEB3A1DB78EC14CB4A
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0046B4D0
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0046B546
                                                          • GetLastError.KERNEL32 ref: 0046B550
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 0046B5BD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: eccad1696ba090c5711fa55b6348286b496d6d94020a94e73532c489e0c9eeb3
                                                          • Instruction ID: 3fb85926d1a8df40b98e85eadc692d0a6e2328ff5e483d9ffe01cb822ebdbf3c
                                                          • Opcode Fuzzy Hash: eccad1696ba090c5711fa55b6348286b496d6d94020a94e73532c489e0c9eeb3
                                                          • Instruction Fuzzy Hash: 29318675A00205AFCB00EB68C845AEE77B4FF45318F10416BF506D7291EB799E86CB9A
                                                          APIs
                                                            • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                            • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                          • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00459014
                                                          • GetDlgCtrlID.USER32 ref: 0045901F
                                                          • GetParent.USER32 ref: 0045903B
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 0045903E
                                                          • GetDlgCtrlID.USER32(?), ref: 00459047
                                                          • GetParent.USER32(?), ref: 00459063
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00459066
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1536045017-1403004172
                                                          • Opcode ID: e527cb334e7d7689371befb81d6d0d32f7406071002c3aa4a78959359ae4abf1
                                                          • Instruction ID: 6714b25adca5f569a88cfbaafbe7bd2dd1ba81f724cd7e2599907f028ed7346a
                                                          • Opcode Fuzzy Hash: e527cb334e7d7689371befb81d6d0d32f7406071002c3aa4a78959359ae4abf1
                                                          • Instruction Fuzzy Hash: D021D870A00108BFDF04ABA1CC85EFEB774EF45310F10062AF911672E2DB795819DB28
                                                          APIs
                                                            • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                            • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                          • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 004590FD
                                                          • GetDlgCtrlID.USER32 ref: 00459108
                                                          • GetParent.USER32 ref: 00459124
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00459127
                                                          • GetDlgCtrlID.USER32(?), ref: 00459130
                                                          • GetParent.USER32(?), ref: 0045914C
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 0045914F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1536045017-1403004172
                                                          • Opcode ID: 788820521d6cad1a15555ef376c01a576536d52651f0e806491d71d2e8ddf36c
                                                          • Instruction ID: 4d8cd3b83cca1d69534b37f7086261ba2dc9307f4c099413b547fbd15d3c7d68
                                                          • Opcode Fuzzy Hash: 788820521d6cad1a15555ef376c01a576536d52651f0e806491d71d2e8ddf36c
                                                          • Instruction Fuzzy Hash: AA21B674A00108BFDF01ABA5CC85EFEBB74EF44301F50452BB911A72A2DB795819DB29
                                                          APIs
                                                          • GetParent.USER32 ref: 0045916F
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00459184
                                                          • _wcscmp.LIBCMT ref: 00459196
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00459211
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend_wcscmp
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1704125052-3381328864
                                                          • Opcode ID: ea2da3042022fb33e5a84bdcfd4780e66fcf499551f9b63f672fb9db9d77b33f
                                                          • Instruction ID: f102ea4107ca07b1db40aa5d7e68bb0b9a0f71bc8f584d68d6a8224326f4a83e
                                                          • Opcode Fuzzy Hash: ea2da3042022fb33e5a84bdcfd4780e66fcf499551f9b63f672fb9db9d77b33f
                                                          • Instruction Fuzzy Hash: 3111E776248317F9FA112624EC06DAB379CAB15721F30046BFD00E40D2FEA95C56666C
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 004611F0
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00460268,?,00000001), ref: 00461204
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 0046120B
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00460268,?,00000001), ref: 0046121A
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 0046122C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00460268,?,00000001), ref: 00461245
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00460268,?,00000001), ref: 00461257
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00460268,?,00000001), ref: 0046129C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00460268,?,00000001), ref: 004612B1
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00460268,?,00000001), ref: 004612BC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: 2caf1bd63dccf00636a063d85e3956ee9e2a291adaf0d7952c1a55c89920e2b2
                                                          • Instruction ID: 1e48a1bdefc3aaf7905b324a82868e76ea33fb60fcd143e126220ea2d996acdd
                                                          • Opcode Fuzzy Hash: 2caf1bd63dccf00636a063d85e3956ee9e2a291adaf0d7952c1a55c89920e2b2
                                                          • Instruction Fuzzy Hash: 2B31D275600208BFDB109F54EC98F6A37A9EF54315F1582BEFA00E62B0E7789D448B5E
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$_memset
                                                          • String ID: ,,I$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2862541840-2080382077
                                                          • Opcode ID: 5e45a4bc97ccb967f3a94fe0c7eba0d1116f12234079cc91aabcb7686965c87b
                                                          • Instruction ID: ae80b45066e4f78fbd037e562a23a34cf658a5e22d7790f01f39a3ab0041c2b1
                                                          • Opcode Fuzzy Hash: 5e45a4bc97ccb967f3a94fe0c7eba0d1116f12234079cc91aabcb7686965c87b
                                                          • Instruction Fuzzy Hash: 62919E30A00205ABDF20DFA1C848FEFB7B8EF49714F10855EE909AB281D7789D05CBA4
                                                          APIs
                                                          • EnumChildWindows.USER32(?,0045A439), ref: 0045A377
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ChildEnumWindows
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                          • API String ID: 3555792229-1603158881
                                                          • Opcode ID: 1424eacf5de64af2c769219169cfdcdf02d038a0872950fffdd1f519614ed5ca
                                                          • Instruction ID: 7454df241f77d0b93e78cd2df6a08ba454d4c5e8e9c0a671585cc9aba64ec447
                                                          • Opcode Fuzzy Hash: 1424eacf5de64af2c769219169cfdcdf02d038a0872950fffdd1f519614ed5ca
                                                          • Instruction Fuzzy Hash: BA91BB70600505AADB08DF61C452BEEF774BF04305F54822FEC59A7242DB3969ADCB99
                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00402EAE
                                                            • Part of subcall function 00401DB3: GetClientRect.USER32(?,?), ref: 00401DDC
                                                            • Part of subcall function 00401DB3: GetWindowRect.USER32(?,?), ref: 00401E1D
                                                            • Part of subcall function 00401DB3: ScreenToClient.USER32(?,?), ref: 00401E45
                                                          • GetDC.USER32 ref: 0043CD32
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0043CD45
                                                          • SelectObject.GDI32(00000000,00000000), ref: 0043CD53
                                                          • SelectObject.GDI32(00000000,00000000), ref: 0043CD68
                                                          • ReleaseDC.USER32(?,00000000), ref: 0043CD70
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0043CDFB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: 3cdb49cb97ee06b786ec44539fc98b371f27cf3cd913876941f0ba4c68568fc2
                                                          • Instruction ID: a06c30b2c7428a2a0e02ce49fef1101dc5652c1e0a779c9989b3b0b616dc9c80
                                                          • Opcode Fuzzy Hash: 3cdb49cb97ee06b786ec44539fc98b371f27cf3cd913876941f0ba4c68568fc2
                                                          • Instruction Fuzzy Hash: 8A71CB31400205DFCF219F64C884AAB3BB5FF48324F14567BFD55AA2A6C7389881DBA9
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0048F910), ref: 00478D28
                                                          • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0048F910), ref: 00478D5C
                                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00478ED6
                                                          • SysFreeString.OLEAUT32(?), ref: 00478F00
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                          • String ID:
                                                          • API String ID: 560350794-0
                                                          • Opcode ID: e599abc5ccc1fcc2afa0811a74523479773a4e2d78cc03c258ebc6d435cce25a
                                                          • Instruction ID: 5de9ffb64ca5e15a2b50b30bc9937a924b2564530b5861c8322637ebb6f06415
                                                          • Opcode Fuzzy Hash: e599abc5ccc1fcc2afa0811a74523479773a4e2d78cc03c258ebc6d435cce25a
                                                          • Instruction Fuzzy Hash: A4F12871A00109AFCB14DF94C888EEEB7B9FF49314F10846AF909AB251DB35AE46CB55
                                                          APIs
                                                          • _memset.LIBCMT ref: 0047F6B5
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0047F848
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0047F86C
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0047F8AC
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0047F8CE
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0047FA4A
                                                          • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0047FA7C
                                                          • CloseHandle.KERNEL32(?), ref: 0047FAAB
                                                          • CloseHandle.KERNEL32(?), ref: 0047FB22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                          • String ID:
                                                          • API String ID: 4090791747-0
                                                          • Opcode ID: 2b929a1bd1707f893cecb8edf8898ba3ed00e552e1f4f34df02758bb210e9ca5
                                                          • Instruction ID: 06b6fb47819207378a011b81351d7d70f99dbcb89b467e7706fbe8a6ff9703be
                                                          • Opcode Fuzzy Hash: 2b929a1bd1707f893cecb8edf8898ba3ed00e552e1f4f34df02758bb210e9ca5
                                                          • Instruction Fuzzy Hash: D8E194716042009FC714EF25C451BAA7BE1BF85314F14856EF8999B3A2DB38EC49CB5A
                                                          APIs
                                                            • Part of subcall function 0046466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00463697,?), ref: 0046468B
                                                            • Part of subcall function 0046466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00463697,?), ref: 004646A4
                                                            • Part of subcall function 00464A31: GetFileAttributesW.KERNEL32(?,0046370B), ref: 00464A32
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00464D40
                                                          • _wcscmp.LIBCMT ref: 00464D5A
                                                          • MoveFileW.KERNEL32(?,?), ref: 00464D75
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                          • String ID:
                                                          • API String ID: 793581249-0
                                                          • Opcode ID: e5efdc4b7bed8b35d3c7756aed83619e761acd6f8ed92700794926c6f689935b
                                                          • Instruction ID: 3e0d64ecfe06201b2d7f4e4ce82b19db3d94e317acadfd9fd6841a38a6d3c077
                                                          • Opcode Fuzzy Hash: e5efdc4b7bed8b35d3c7756aed83619e761acd6f8ed92700794926c6f689935b
                                                          • Instruction Fuzzy Hash: 1D5164B25083459BCB24EFA1D8819DF73ECAF84354F40092FB289D3151EE79A589C76B
                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 004886FF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: 9e4666c3df532daa50fe19b6785993d851fb0bba6d5b1ec7531c4121b57b79da
                                                          • Instruction ID: 67c69bdd2abc2e43d0d58bc2ecba6baab6695951e18c15bee5b3ec72a7eaee37
                                                          • Opcode Fuzzy Hash: 9e4666c3df532daa50fe19b6785993d851fb0bba6d5b1ec7531c4121b57b79da
                                                          • Instruction Fuzzy Hash: BE519530500244BEDB20BB298C89F5E7B64EB05724FA0492FF911E62E1DF79A990DB5D
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0043C2F7
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0043C319
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0043C331
                                                          • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0043C34F
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0043C370
                                                          • DestroyIcon.USER32(00000000), ref: 0043C37F
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0043C39C
                                                          • DestroyIcon.USER32(?), ref: 0043C3AB
                                                            • Part of subcall function 0048A4AF: DeleteObject.GDI32(00000000), ref: 0048A4E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                          • String ID:
                                                          • API String ID: 2819616528-0
                                                          • Opcode ID: 30831d3652e0c4a0d09569093ab55e826fc0c5f0f59ece252e466e99477c3991
                                                          • Instruction ID: 8b5e312d24aa0fc7293d55633b028b71e285ae3fa30838bdc618f7a4141ee9b3
                                                          • Opcode Fuzzy Hash: 30831d3652e0c4a0d09569093ab55e826fc0c5f0f59ece252e466e99477c3991
                                                          • Instruction Fuzzy Hash: 9D516A74A00205AFDB20DF65CD85FAF3BB5EB58310F10452EF902A72D0D7B4A991DB68
                                                          APIs
                                                            • Part of subcall function 0045A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0045A84C
                                                            • Part of subcall function 0045A82C: GetCurrentThreadId.KERNEL32 ref: 0045A853
                                                            • Part of subcall function 0045A82C: AttachThreadInput.USER32(00000000,?,00459683,?,00000001), ref: 0045A85A
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 0045968E
                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 004596AB
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 004596AE
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 004596B7
                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 004596D5
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 004596D8
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 004596E1
                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 004596F8
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 004596FB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                          • String ID:
                                                          • API String ID: 2014098862-0
                                                          • Opcode ID: 97659e6d0eeaf490ac976d3d5fe311f7ccd298156506907ffd454ad2a564656a
                                                          • Instruction ID: 1862abde6b5ba1d27f2b77b23e96e8fddf5d6721de8ccd0207d4cd72f070cce3
                                                          • Opcode Fuzzy Hash: 97659e6d0eeaf490ac976d3d5fe311f7ccd298156506907ffd454ad2a564656a
                                                          • Instruction Fuzzy Hash: F011E571910618BEF6106F61DC49F6E3B1DDB4C755F100939F644AB0A1CAF25C15DBA8
                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0045853C,00000B00,?,?), ref: 0045892A
                                                          • HeapAlloc.KERNEL32(00000000,?,0045853C,00000B00,?,?), ref: 00458931
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0045853C,00000B00,?,?), ref: 00458946
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,0045853C,00000B00,?,?), ref: 0045894E
                                                          • DuplicateHandle.KERNEL32(00000000,?,0045853C,00000B00,?,?), ref: 00458951
                                                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0045853C,00000B00,?,?), ref: 00458961
                                                          • GetCurrentProcess.KERNEL32(0045853C,00000000,?,0045853C,00000B00,?,?), ref: 00458969
                                                          • DuplicateHandle.KERNEL32(00000000,?,0045853C,00000B00,?,?), ref: 0045896C
                                                          • CreateThread.KERNEL32(00000000,00000000,00458992,00000000,00000000,00000000), ref: 00458986
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: 3e7611f068968c6c6daa1a3146ff6b5b84d59536ecce8ca695804ebc6f6fd54c
                                                          • Instruction ID: 349ed70c1d76ccaf0bdfd0abb61d7988567b7a63eab8a905bd57cb3f4c4245c0
                                                          • Opcode Fuzzy Hash: 3e7611f068968c6c6daa1a3146ff6b5b84d59536ecce8ca695804ebc6f6fd54c
                                                          • Instruction Fuzzy Hash: 4801BBB5240308FFE710ABA5DC8DF6B7BACEB89711F508825FA05DB1A1CA759C14CB24
                                                          APIs
                                                            • Part of subcall function 0045710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?,?,00457455), ref: 00457127
                                                            • Part of subcall function 0045710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 00457142
                                                            • Part of subcall function 0045710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 00457150
                                                            • Part of subcall function 0045710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?), ref: 00457160
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00479806
                                                          • _memset.LIBCMT ref: 00479813
                                                          • _memset.LIBCMT ref: 00479956
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00479982
                                                          • CoTaskMemFree.OLE32(?), ref: 0047998D
                                                          Strings
                                                          • NULL Pointer assignment, xrefs: 004799DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 1300414916-2785691316
                                                          • Opcode ID: 45d3d11671b48f4c91a0fa55736b5ede04149e8acd56d59b25060feee5a3bfa2
                                                          • Instruction ID: 344d97a8cecc5579365d94fc52d7d4a9bdae2fe77cb17e56d270d326fab8ac0d
                                                          • Opcode Fuzzy Hash: 45d3d11671b48f4c91a0fa55736b5ede04149e8acd56d59b25060feee5a3bfa2
                                                          • Instruction Fuzzy Hash: BD915CB1D00218EBDB10DFA5DC81EDEBBB9EF08314F10806AF519A7291EB755A44CFA5
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00486E24
                                                          • SendMessageW.USER32(?,00001036,00000000,?), ref: 00486E38
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00486E52
                                                          • _wcscat.LIBCMT ref: 00486EAD
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00486EC4
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00486EF2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcscat
                                                          • String ID: SysListView32
                                                          • API String ID: 307300125-78025650
                                                          • Opcode ID: 16f1706c89c53c521989aa15edd3457245b1a700a2ad8cceaac67dbb77529257
                                                          • Instruction ID: cb01a20e413fb831c79b84d4e1a22deaf7a16da1e784ee9815b65cba95e2bd2f
                                                          • Opcode Fuzzy Hash: 16f1706c89c53c521989aa15edd3457245b1a700a2ad8cceaac67dbb77529257
                                                          • Instruction Fuzzy Hash: 6341A370A00308ABDB21AF64CC85BEF77F8EF08354F11082BF544A7291D6799D858B68
                                                          APIs
                                                            • Part of subcall function 00463C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00463C7A
                                                            • Part of subcall function 00463C55: Process32FirstW.KERNEL32(00000000,?), ref: 00463C88
                                                            • Part of subcall function 00463C55: CloseHandle.KERNEL32(00000000), ref: 00463D52
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0047E9A4
                                                          • GetLastError.KERNEL32 ref: 0047E9B7
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0047E9E6
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 0047EA63
                                                          • GetLastError.KERNEL32(00000000), ref: 0047EA6E
                                                          • CloseHandle.KERNEL32(00000000), ref: 0047EAA3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: 1fbe102fe1978df8388a2962b1b00d0cd5216d5acde680508b8c4a8fc22a507b
                                                          • Instruction ID: ee7027a858fb35c2998370541a0cb7821fbd3e1ab4d9769570fd7f32c35e06b7
                                                          • Opcode Fuzzy Hash: 1fbe102fe1978df8388a2962b1b00d0cd5216d5acde680508b8c4a8fc22a507b
                                                          • Instruction Fuzzy Hash: E1419D712002009FDB10EF25DC95BAEB7A5AF44318F04856EF9069B3C2DB78AC09CB99
                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 00463033
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: 55f9dc3ea46c5c896c834eceb9773494ed516fdc9e05eb433b65141dcb2bff31
                                                          • Instruction ID: 1734436af2ca56e59899cd3bdf017f39c547290e8d4403808a282f24c331c6a5
                                                          • Opcode Fuzzy Hash: 55f9dc3ea46c5c896c834eceb9773494ed516fdc9e05eb433b65141dcb2bff31
                                                          • Instruction Fuzzy Hash: F211F631348386BAE7249E55DC42DAF679C9F15365B20002FF90066281FAFC5E4956AE
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00464312
                                                          • LoadStringW.USER32(00000000), ref: 00464319
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0046432F
                                                          • LoadStringW.USER32(00000000), ref: 00464336
                                                          • _wprintf.LIBCMT ref: 0046435C
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0046437A
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 00464357
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wprintf
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 3648134473-3128320259
                                                          • Opcode ID: 965032fae8988b6724a64616dd310853d65f609a359c49a1a2d3266552516382
                                                          • Instruction ID: 8e316eae760c98dab52acacd6546c6ae495e9062239688ff7a3f09ebd5f77a5e
                                                          • Opcode Fuzzy Hash: 965032fae8988b6724a64616dd310853d65f609a359c49a1a2d3266552516382
                                                          • Instruction Fuzzy Hash: CB0167F2900208BFD751AB90DD89EFB776CEB08301F5009B6BB45E2151FA785E894B79
                                                          APIs
                                                            • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                          • GetSystemMetrics.USER32(0000000F), ref: 0048D47C
                                                          • GetSystemMetrics.USER32(0000000F), ref: 0048D49C
                                                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0048D6D7
                                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0048D6F5
                                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0048D716
                                                          • ShowWindow.USER32(00000003,00000000), ref: 0048D735
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0048D75A
                                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 0048D77D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                          • String ID:
                                                          • API String ID: 1211466189-0
                                                          • Opcode ID: d3703f674391628daf823e2a44e71b595811e89c5d6afcb3d767f65da08f560a
                                                          • Instruction ID: 2f618d94a1d43a989375790be64f9a6bb81cc316bd664b93e4dd4f842dd9a18d
                                                          • Opcode Fuzzy Hash: d3703f674391628daf823e2a44e71b595811e89c5d6afcb3d767f65da08f560a
                                                          • Instruction Fuzzy Hash: 2EB1AE71901219EFDF14EF68C9857AE7BB1BF04701F08847AEC48AB295E738A950CB54
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000), ref: 00402ACF
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00402B17
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000), ref: 0043C21A
                                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000), ref: 0043C286
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 58d7e91fded017a6e0efb4e40d8d562d2957b08ffb939ead570b381b4f40fd88
                                                          • Instruction ID: 9bc26204a44dec3219c5fdbddb2daa96843464872a345c1f9b74dd9d2987fb79
                                                          • Opcode Fuzzy Hash: 58d7e91fded017a6e0efb4e40d8d562d2957b08ffb939ead570b381b4f40fd88
                                                          • Instruction Fuzzy Hash: 514111307046809ADF755B298ECCB6F7791AB45304F14887FE047B26E0CABDA846DB2D
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 004670DD
                                                            • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                                            • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00467114
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00467130
                                                          • _memmove.LIBCMT ref: 0046717E
                                                          • _memmove.LIBCMT ref: 0046719B
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 004671AA
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 004671BF
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 004671DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 256516436-0
                                                          • Opcode ID: afb406dbd2be9d4a7f11f53614fe015c4fbe63102b141997cec2d1305d9ec3c3
                                                          • Instruction ID: 188a4d0b29229593a2b146342a062b1bd5409cf6fda6c026f11dbcde1a99e618
                                                          • Opcode Fuzzy Hash: afb406dbd2be9d4a7f11f53614fe015c4fbe63102b141997cec2d1305d9ec3c3
                                                          • Instruction Fuzzy Hash: F131A131A00215EBCF00DFA5DC85AAFB7B8EF45714F1441BAF9049B246EB349E14CBA9
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 004861EB
                                                          • GetDC.USER32(00000000), ref: 004861F3
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004861FE
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 0048620A
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00486246
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00486257
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0048902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00486291
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 004862B1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: cf317ad195164d60a9274800805a8c3d798bcd83c3ff523b59fa5e1fadae3bb4
                                                          • Instruction ID: f4278305449edce2f76c410d332ec57268d6ee35a6a277c822a0a6189647fcfb
                                                          • Opcode Fuzzy Hash: cf317ad195164d60a9274800805a8c3d798bcd83c3ff523b59fa5e1fadae3bb4
                                                          • Instruction Fuzzy Hash: 46317172101210BFEB115F50DC4AFEB3BADEF49755F0540A9FE08AA291D6759C41CB68
                                                          APIs
                                                            • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                            • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                            • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                                          • _wcstok.LIBCMT ref: 0046EC94
                                                          • _wcscpy.LIBCMT ref: 0046ED23
                                                          • _memset.LIBCMT ref: 0046ED56
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                          • String ID: X
                                                          • API String ID: 774024439-3081909835
                                                          • Opcode ID: a56a084b8b4a01d2fb602c2c37a2110a471070e1633dca65706d8e1c1431c908
                                                          • Instruction ID: da02439699827519884de0a837ef4d7055a253f99ddb834d536b4edba3b8eab3
                                                          • Opcode Fuzzy Hash: a56a084b8b4a01d2fb602c2c37a2110a471070e1633dca65706d8e1c1431c908
                                                          • Instruction Fuzzy Hash: E1C161756083019FD714EF25D841A5AB7E4FF85318F10492EF899A72A2EB38EC45CB4B
                                                          APIs
                                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00476C00
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00476C21
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00476C34
                                                          • htons.WSOCK32(?,?,?,00000000,?), ref: 00476CEA
                                                          • inet_ntoa.WSOCK32(?), ref: 00476CA7
                                                            • Part of subcall function 0045A7E9: _strlen.LIBCMT ref: 0045A7F3
                                                            • Part of subcall function 0045A7E9: _memmove.LIBCMT ref: 0045A815
                                                          • _strlen.LIBCMT ref: 00476D44
                                                          • _memmove.LIBCMT ref: 00476DAD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                          • String ID:
                                                          • API String ID: 3619996494-0
                                                          • Opcode ID: eb063af499b28503b1661a002f02a4245d1d84fb7d81a0d2f90fb921427c51ed
                                                          • Instruction ID: ed0775ecea4f9d6c11d03e52ad69743ddbee2f845c96f8b55ead14f2c665c5c3
                                                          • Opcode Fuzzy Hash: eb063af499b28503b1661a002f02a4245d1d84fb7d81a0d2f90fb921427c51ed
                                                          • Instruction Fuzzy Hash: 3081E971204700AFC710EB25CC81EABB7A9EF84718F10892EF559A72D2DB78ED05CB59
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5023a88ac2a4e028a815ef4d4db6f605c18ba5c71fdc3231c60cda9a6e4bf417
                                                          • Instruction ID: a887e684d243743618d1057532b585a7ad503945d0d011121e70032f0d2e3d72
                                                          • Opcode Fuzzy Hash: 5023a88ac2a4e028a815ef4d4db6f605c18ba5c71fdc3231c60cda9a6e4bf417
                                                          • Instruction Fuzzy Hash: 85715F30900109EFDB04DF95CC89EBF7B75FF85314F14816AF915AA2A1C738AA51CBA9
                                                          APIs
                                                          • IsWindow.USER32(00C32910), ref: 0048B3EB
                                                          • IsWindowEnabled.USER32(00C32910), ref: 0048B3F7
                                                          • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0048B4DB
                                                          • SendMessageW.USER32(00C32910,000000B0,?,?), ref: 0048B512
                                                          • IsDlgButtonChecked.USER32(?,?), ref: 0048B54F
                                                          • GetWindowLongW.USER32(00C32910,000000EC), ref: 0048B571
                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0048B589
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                          • String ID:
                                                          • API String ID: 4072528602-0
                                                          • Opcode ID: af34dbccf799c1c6a714d1a93faded036c611a6d887c638bd2f6846a6a243747
                                                          • Instruction ID: 3cfba568ea5790526d5b286793119b4d477072028a14d6832b16bbf893ccb4d1
                                                          • Opcode Fuzzy Hash: af34dbccf799c1c6a714d1a93faded036c611a6d887c638bd2f6846a6a243747
                                                          • Instruction Fuzzy Hash: 9B71BF34601604EFDB21AF54CC95FBF7BA9EF09700F14486EE941973A2C739A891DB98
                                                          APIs
                                                          • _memset.LIBCMT ref: 0047F448
                                                          • _memset.LIBCMT ref: 0047F511
                                                          • ShellExecuteExW.SHELL32(?), ref: 0047F556
                                                            • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                            • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                            • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                                          • GetProcessId.KERNEL32(00000000), ref: 0047F5CD
                                                          • CloseHandle.KERNEL32(00000000), ref: 0047F5FC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                          • String ID: @
                                                          • API String ID: 3522835683-2766056989
                                                          • Opcode ID: 98a06052e6037ea6fb2970c60483761811ec359651e683da2548889ff509ee4d
                                                          • Instruction ID: 5c1dd39b7f321ddcc7bcc10d078eb251a602d9f768a890d439a18523313ae713
                                                          • Opcode Fuzzy Hash: 98a06052e6037ea6fb2970c60483761811ec359651e683da2548889ff509ee4d
                                                          • Instruction Fuzzy Hash: 3B61B1B1A006189FCB04EF55C48099EB7F5FF48314F14846EE819BB392CB38AD45CB88
                                                          APIs
                                                          • GetParent.USER32(?), ref: 00460F8C
                                                          • GetKeyboardState.USER32(?), ref: 00460FA1
                                                          • SetKeyboardState.USER32(?), ref: 00461002
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00461030
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 0046104F
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00461095
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 004610B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: f9d591f81d686d4ab57c3a6e12a7387580c65fa7c1b8952d65f3ab419e893261
                                                          • Instruction ID: d8e1dc28bdc088eb6cbc7413f3b60f262c6bc769533ec748a7a92d83500406ea
                                                          • Opcode Fuzzy Hash: f9d591f81d686d4ab57c3a6e12a7387580c65fa7c1b8952d65f3ab419e893261
                                                          • Instruction Fuzzy Hash: 5F51D1A05046D53DFB3642348C15BBBBEA95B06304F0C898EE1D4959E3E2DDDCC8D75A
                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 00460DA5
                                                          • GetKeyboardState.USER32(?), ref: 00460DBA
                                                          • SetKeyboardState.USER32(?), ref: 00460E1B
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00460E47
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00460E64
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00460EA8
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00460EC9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: f49cedba9ac32d54de8a0d60295adc9efc4f295a5ca7e66696c334580efe5f7b
                                                          • Instruction ID: 69172e86244207f9b898dfa665998bef84c2b13c00b7e8d8db4e4b2c62b94f0a
                                                          • Opcode Fuzzy Hash: f49cedba9ac32d54de8a0d60295adc9efc4f295a5ca7e66696c334580efe5f7b
                                                          • Instruction Fuzzy Hash: 035136A05447D53DFB368334CC41B7B7FA95B06300F08898EE1D4569C2E39AAC88D35A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _wcsncpy$LocalTime
                                                          • String ID:
                                                          • API String ID: 2945705084-0
                                                          • Opcode ID: 07e0947fe95a8180eaf0aa6e348e8d9897622cda980e67335bb2af8a3bf9752e
                                                          • Instruction ID: 7a6b7d837badcf90248cfae842bd011e2e93fbf2a36f5ea1b26b70f3dca78a8a
                                                          • Opcode Fuzzy Hash: 07e0947fe95a8180eaf0aa6e348e8d9897622cda980e67335bb2af8a3bf9752e
                                                          • Instruction Fuzzy Hash: 5541B565D1022476CB11EBB59846ACFB7B8AF05311F90485BF508E3221FA78E285C7AE
                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0045D5D4
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0045D60A
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0045D61B
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0045D69D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: ,,I$DllGetClassObject
                                                          • API String ID: 753597075-1683996018
                                                          • Opcode ID: 33bd84876332b2fdda090ed26e6294b9c181052f8b99c0919512b630bc0f7b16
                                                          • Instruction ID: 3f0141d9bf832a65cf1f2fff52dd88c9064c6a7eaa25d9247cf5eee920db5d90
                                                          • Opcode Fuzzy Hash: 33bd84876332b2fdda090ed26e6294b9c181052f8b99c0919512b630bc0f7b16
                                                          • Instruction Fuzzy Hash: 1B41A4B1900204EFDF24DF14C884A9A7BA9EF44315F1581AEEC09DF206D7B4DD49CBA8
                                                          APIs
                                                            • Part of subcall function 0046466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00463697,?), ref: 0046468B
                                                            • Part of subcall function 0046466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00463697,?), ref: 004646A4
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 004636B7
                                                          • _wcscmp.LIBCMT ref: 004636D3
                                                          • MoveFileW.KERNEL32(?,?), ref: 004636EB
                                                          • _wcscat.LIBCMT ref: 00463733
                                                          • SHFileOperationW.SHELL32(?), ref: 0046379F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 1377345388-1173974218
                                                          • Opcode ID: 0993e5ca929c2efa997c1b424dbcfd90290d04f9ce8d0f9705211f6a3ce64837
                                                          • Instruction ID: 4e874dc4fae4897927e7b4621483e23afab501f30efb2571b7469179fc3cc0d5
                                                          • Opcode Fuzzy Hash: 0993e5ca929c2efa997c1b424dbcfd90290d04f9ce8d0f9705211f6a3ce64837
                                                          • Instruction Fuzzy Hash: 1A418FB1508344AEC752EF65D4419DFB7E8AF88345F40082FB48AC3261FA38D689C75B
                                                          APIs
                                                          • _memset.LIBCMT ref: 004872AA
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00487351
                                                          • IsMenu.USER32(?), ref: 00487369
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004873B1
                                                          • DrawMenuBar.USER32 ref: 004873C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert_memset
                                                          • String ID: 0
                                                          • API String ID: 3866635326-4108050209
                                                          • Opcode ID: 0ee1f44b2a5140251d286675eb963f933f852416e711f3c94e98620d4ff88054
                                                          • Instruction ID: fcd3fc1e0e94e91f8146e9bbeff2772ee04bbaba0065c2a20de26dc7b403efd4
                                                          • Opcode Fuzzy Hash: 0ee1f44b2a5140251d286675eb963f933f852416e711f3c94e98620d4ff88054
                                                          • Instruction Fuzzy Hash: AA411675A04208AFDB20EF50D894A9EBBB4FB04350F24882AFD15A7360D734ED64EB65
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00480FD4
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00480FFE
                                                          • FreeLibrary.KERNEL32(00000000), ref: 004810B5
                                                            • Part of subcall function 00480FA5: RegCloseKey.ADVAPI32(?), ref: 0048101B
                                                            • Part of subcall function 00480FA5: FreeLibrary.KERNEL32(?), ref: 0048106D
                                                            • Part of subcall function 00480FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00481090
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00481058
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                          • String ID:
                                                          • API String ID: 395352322-0
                                                          • Opcode ID: b5131dabd4a2a67cadfd2e986b415e323ff756628087c751aedefec5cbf298fe
                                                          • Instruction ID: 3e22e70b6f2616eb7250a30d7d8a48524582d6e50c9a57dc89dcd50e66651605
                                                          • Opcode Fuzzy Hash: b5131dabd4a2a67cadfd2e986b415e323ff756628087c751aedefec5cbf298fe
                                                          • Instruction Fuzzy Hash: E2311D71900109BFDB15AF90DC89EFFB7BCEF09300F10096BE501E2251D6745E8A9BA9
                                                          APIs
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 004862EC
                                                          • GetWindowLongW.USER32(00C32910,000000F0), ref: 0048631F
                                                          • GetWindowLongW.USER32(00C32910,000000F0), ref: 00486354
                                                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00486386
                                                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 004863B0
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 004863C1
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 004863DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: b6c63574b2784a6fe8e125d212b22f8229395cc3faf42e06ca4ca63f68dab27c
                                                          • Instruction ID: de0077e50bd3e6fac1d65856e76e1ec94ed34838b8122e9b1a950ed70c11c10c
                                                          • Opcode Fuzzy Hash: b6c63574b2784a6fe8e125d212b22f8229395cc3faf42e06ca4ca63f68dab27c
                                                          • Instruction Fuzzy Hash: 2B3125306001509FDB61EF18EC84F6E37E1FB4A714F1A05B9F9009F2B1CB75A8849B59
                                                          APIs
                                                            • Part of subcall function 00477D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00477DB6
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 004761C6
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 004761D5
                                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0047620E
                                                          • connect.WSOCK32(00000000,?,00000010), ref: 00476217
                                                          • WSAGetLastError.WSOCK32 ref: 00476221
                                                          • closesocket.WSOCK32(00000000), ref: 0047624A
                                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00476263
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 910771015-0
                                                          • Opcode ID: 2c772d8cd10b281ebb58c123377a2f6f77deb8af44f3e8561ff8297571aede33
                                                          • Instruction ID: 9a8db824e4f103e753759010288aef610dd859574b1bdde890bb221953e34ba6
                                                          • Opcode Fuzzy Hash: 2c772d8cd10b281ebb58c123377a2f6f77deb8af44f3e8561ff8297571aede33
                                                          • Instruction Fuzzy Hash: E131C671600104ABDF10BF64CC85BBE77ADEB45714F05846EFD09A7292DB78AC088B65
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 1038674560-2734436370
                                                          • Opcode ID: 659df752051c6ea00e2ad20bc59bb8864dd8c715ed7b4aab4cd92ca4da0ea462
                                                          • Instruction ID: 032906fc094d91378a6d64986483b761754d261e1b02b5d61cc05f8db2f6dc85
                                                          • Opcode Fuzzy Hash: 659df752051c6ea00e2ad20bc59bb8864dd8c715ed7b4aab4cd92ca4da0ea462
                                                          • Instruction Fuzzy Hash: E621487220412166D620AA35AC02FA773D8AF59305B90443BFC4286192EB9C9D4EC29F
                                                          APIs
                                                            • Part of subcall function 00401D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00401D73
                                                            • Part of subcall function 00401D35: GetStockObject.GDI32(00000011), ref: 00401D87
                                                            • Part of subcall function 00401D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00401D91
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00487632
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0048763F
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0048764A
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00487659
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00487665
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: 89b1357e1ee64075d60cbe96e93ddb663670d2e9d7f59c86534f55b80d263953
                                                          • Instruction ID: 4837c572468b061b20148283283cd62aa6e96b5405c17b40ad05b898919227a4
                                                          • Opcode Fuzzy Hash: 89b1357e1ee64075d60cbe96e93ddb663670d2e9d7f59c86534f55b80d263953
                                                          • Instruction Fuzzy Hash: B711D3B1110119BFEF109F64CC85EEB7F5DEF083A8F114115BA04A21A0D776AC21DBA8
                                                          APIs
                                                          • _memset.LIBCMT ref: 0048B644
                                                          • _memset.LIBCMT ref: 0048B653
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,004C6F20,004C6F64), ref: 0048B682
                                                          • CloseHandle.KERNEL32 ref: 0048B694
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseCreateHandleProcess
                                                          • String ID: oL$doL
                                                          • API String ID: 3277943733-3421622115
                                                          • Opcode ID: f6592324f54b6d11ff0072cf87150bc2a8f8a0fa5e3a8a7e269d397b8f6a706e
                                                          • Instruction ID: 7a1fecbce043cfc874fe0d77b44da30ff063324afa3e4e90fef9887594455fd0
                                                          • Opcode Fuzzy Hash: f6592324f54b6d11ff0072cf87150bc2a8f8a0fa5e3a8a7e269d397b8f6a706e
                                                          • Instruction Fuzzy Hash: 20F05EB26403107AE2502761BC06FBB3A9CEB08395F41843ABE08E5192D7799C00C7AC
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00423F85), ref: 00424085
                                                          • GetProcAddress.KERNEL32(00000000), ref: 0042408C
                                                          • EncodePointer.KERNEL32(00000000), ref: 00424097
                                                          • DecodePointer.KERNEL32(00423F85), ref: 004240B2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                          • String ID: RoUninitialize$combase.dll
                                                          • API String ID: 3489934621-2819208100
                                                          • Opcode ID: a073a7a123edb79e47074a0cfae65335df484428d24780242fe31235a0946bf9
                                                          • Instruction ID: 3c20c996fd7074992a56bc66f3091c9a5c2557e351e9bc0918c4c0f6e68dcf68
                                                          • Opcode Fuzzy Hash: a073a7a123edb79e47074a0cfae65335df484428d24780242fe31235a0946bf9
                                                          • Instruction Fuzzy Hash: DBE09270681200AFEA90AF62ED0DB8A3AA5B704743F14893AF501E11A0CFBA46489B1C
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memmove$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 3253778849-0
                                                          • Opcode ID: 3fb0b71cd3b5fa1b33507c2e851feef5e9dc8e8adfdfdbcab98cff070aef8684
                                                          • Instruction ID: 21da70feb02ff46742cf7b1a596b1e1f747712b30ca55ffc0ed3d6fa2aea8e56
                                                          • Opcode Fuzzy Hash: 3fb0b71cd3b5fa1b33507c2e851feef5e9dc8e8adfdfdbcab98cff070aef8684
                                                          • Instruction Fuzzy Hash: 6261707160025A9BCF01EF61DC81AFE37A5AF05308F45452EF8556B293EB38AD05CB5A
                                                          APIs
                                                            • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                            • Part of subcall function 00480E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004802BD
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004802FD
                                                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00480320
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00480349
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0048038C
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00480399
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                          • String ID:
                                                          • API String ID: 4046560759-0
                                                          • Opcode ID: 55b2a87cd8037f5fb34e7132d60673283e345c063b8d9bd62c294994822b22fe
                                                          • Instruction ID: d871ff08e979a7a46cd08627f86c845b9cb8169993b1d7d4ad27b4e2648fe78e
                                                          • Opcode Fuzzy Hash: 55b2a87cd8037f5fb34e7132d60673283e345c063b8d9bd62c294994822b22fe
                                                          • Instruction Fuzzy Hash: 68515C71118204AFC710EF65C885E6FBBE8FF85318F04492EF945972A2DB35E909CB56
                                                          APIs
                                                          • GetMenu.USER32(?), ref: 004857FB
                                                          • GetMenuItemCount.USER32(00000000), ref: 00485832
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0048585A
                                                          • GetMenuItemID.USER32(?,?), ref: 004858C9
                                                          • GetSubMenu.USER32(?,?), ref: 004858D7
                                                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 00485928
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountMessagePostString
                                                          • String ID:
                                                          • API String ID: 650687236-0
                                                          • Opcode ID: 230dc1c98bfac88e764d8146ebfd1f08154c5ae3b928d84f1983312ad18440ef
                                                          • Instruction ID: f019c79df8c938943ad8434395c060b2cb7e18679ec399e957168710705cd923
                                                          • Opcode Fuzzy Hash: 230dc1c98bfac88e764d8146ebfd1f08154c5ae3b928d84f1983312ad18440ef
                                                          • Instruction Fuzzy Hash: 72514C75E00615AFCF11EF65C845AAEBBB4EF48314F10446AE801BB352DB78AE418B99
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 0045EF06
                                                          • VariantClear.OLEAUT32(00000013), ref: 0045EF78
                                                          • VariantClear.OLEAUT32(00000000), ref: 0045EFD3
                                                          • _memmove.LIBCMT ref: 0045EFFD
                                                          • VariantClear.OLEAUT32(?), ref: 0045F04A
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0045F078
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType_memmove
                                                          • String ID:
                                                          • API String ID: 1101466143-0
                                                          • Opcode ID: 3a696c756d5f9f21b3064a47137a411a2eda9f735d8382ec367d4cfec0c8664e
                                                          • Instruction ID: 3df6c570488be2a998a5abfaea7cf2d50daf9fdb1352742cca5bf42246c3e2d0
                                                          • Opcode Fuzzy Hash: 3a696c756d5f9f21b3064a47137a411a2eda9f735d8382ec367d4cfec0c8664e
                                                          • Instruction Fuzzy Hash: 04517D75A00209EFCB14CF58C884AAAB7B8FF4C314B15856AED49DB342E334E915CF94
                                                          APIs
                                                          • _memset.LIBCMT ref: 00462258
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004622A3
                                                          • IsMenu.USER32(00000000), ref: 004622C3
                                                          • CreatePopupMenu.USER32 ref: 004622F7
                                                          • GetMenuItemCount.USER32(000000FF), ref: 00462355
                                                          • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00462386
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                          • String ID:
                                                          • API String ID: 3311875123-0
                                                          • Opcode ID: cf97df88117ddcc5f0fa513269a15dde7708b163d82bf74e49b6c8debfa24165
                                                          • Instruction ID: 667f6c59849a63ea2ae133147cac6ec600f1389f3bfda063d60b04a3024e98c7
                                                          • Opcode Fuzzy Hash: cf97df88117ddcc5f0fa513269a15dde7708b163d82bf74e49b6c8debfa24165
                                                          • Instruction Fuzzy Hash: 0F51A370500649FBDF21CF64CA44B9EBBF5BF05318F10456AE81197390E3B88985CB5B
                                                          APIs
                                                            • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                          • BeginPaint.USER32(?,?,?,?,?,?), ref: 0040179A
                                                          • GetWindowRect.USER32(?,?), ref: 004017FE
                                                          • ScreenToClient.USER32(?,?), ref: 0040181B
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0040182C
                                                          • EndPaint.USER32(?,?), ref: 00401876
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                          • String ID:
                                                          • API String ID: 1827037458-0
                                                          • Opcode ID: d9366b8442643d94811bf82364bc44e8890a7fb11cafe672375ae29e37d5b646
                                                          • Instruction ID: 802354e609c34c5ad38a523f12b28351d49e30531d5e0f2791b792dab913329b
                                                          • Opcode Fuzzy Hash: d9366b8442643d94811bf82364bc44e8890a7fb11cafe672375ae29e37d5b646
                                                          • Instruction Fuzzy Hash: AF418E31100700AFD710EF25C884FAA7BE8EB49724F044A3EFA94962F1C734A945DB6A
                                                          APIs
                                                          • ShowWindow.USER32(004C57B0,00000000,00C32910,?,?,004C57B0,?,0048B5A8,?,?), ref: 0048B712
                                                          • EnableWindow.USER32(00000000,00000000), ref: 0048B736
                                                          • ShowWindow.USER32(004C57B0,00000000,00C32910,?,?,004C57B0,?,0048B5A8,?,?), ref: 0048B796
                                                          • ShowWindow.USER32(00000000,00000004,?,0048B5A8,?,?), ref: 0048B7A8
                                                          • EnableWindow.USER32(00000000,00000001), ref: 0048B7CC
                                                          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0048B7EF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: 7ca0fe6c9807323bcc0ac8ff00a913c3fb6576fd02a22b3a16232a66ac7b93cd
                                                          • Instruction ID: 1d3b34d551e73e97491640bec01ce8c12bc83bc2c135b759935fb039f22faf4f
                                                          • Opcode Fuzzy Hash: 7ca0fe6c9807323bcc0ac8ff00a913c3fb6576fd02a22b3a16232a66ac7b93cd
                                                          • Instruction Fuzzy Hash: 1941A834600340AFDB21DF28C499B9A7BE0FF49310F5845BAF9488F762C735A856CB94
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,?,?,?,?,00474E41,?,?,00000000,00000001), ref: 004770AC
                                                            • Part of subcall function 004739A0: GetWindowRect.USER32(?,?), ref: 004739B3
                                                          • GetDesktopWindow.USER32 ref: 004770D6
                                                          • GetWindowRect.USER32(00000000), ref: 004770DD
                                                          • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0047710F
                                                            • Part of subcall function 00465244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004652BC
                                                          • GetCursorPos.USER32(?), ref: 0047713B
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00477199
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                          • String ID:
                                                          • API String ID: 4137160315-0
                                                          • Opcode ID: 3cdeb131284200fba8ef2e28f13c3857e1f37640968ff1f5e935f4a9860c8469
                                                          • Instruction ID: 96178dbc809958a90b6454061f905f6e8cc6bb80431ab620535fad6e804f8cbf
                                                          • Opcode Fuzzy Hash: 3cdeb131284200fba8ef2e28f13c3857e1f37640968ff1f5e935f4a9860c8469
                                                          • Instruction Fuzzy Hash: 2131D472605305ABD720DF14D849B9FB7A9FF88314F40092EF58997291D734EA09CB9A
                                                          APIs
                                                            • Part of subcall function 004580A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 004580C0
                                                            • Part of subcall function 004580A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 004580CA
                                                            • Part of subcall function 004580A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 004580D9
                                                            • Part of subcall function 004580A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 004580E0
                                                            • Part of subcall function 004580A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 004580F6
                                                          • GetLengthSid.ADVAPI32(?,00000000,0045842F), ref: 004588CA
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 004588D6
                                                          • HeapAlloc.KERNEL32(00000000), ref: 004588DD
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 004588F6
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,0045842F), ref: 0045890A
                                                          • HeapFree.KERNEL32(00000000), ref: 00458911
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: 899df585734c4cf6e549910b9baf9cc1d52bbabddfc3f51843167315329ebb0f
                                                          • Instruction ID: 7059436e0a451666cc74b436c7695f43cca8d294219cfb63d8684b6348989bdb
                                                          • Opcode Fuzzy Hash: 899df585734c4cf6e549910b9baf9cc1d52bbabddfc3f51843167315329ebb0f
                                                          • Instruction Fuzzy Hash: 8E11AF71501609FFDB109FA4DC09BBFB7A8EB45316F10442EE845A7211CF3AAD18DB69
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 004585E2
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 004585E9
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 004585F8
                                                          • CloseHandle.KERNEL32(00000004), ref: 00458603
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00458632
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00458646
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: 594d4e30fb024ea406b8e6751db59f03e6ebc423b2dce8d7814a5cb8bfdeea6b
                                                          • Instruction ID: 159165bab53b04d3cbba9e0d8ed23f629fb96fbb8b96a1f823f3c86320dce82d
                                                          • Opcode Fuzzy Hash: 594d4e30fb024ea406b8e6751db59f03e6ebc423b2dce8d7814a5cb8bfdeea6b
                                                          • Instruction Fuzzy Hash: 7111597250120DBBDF018FA4DD49BEF7BA9EF08305F144069FE04A2161CB769E69EB64
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 0045B7B5
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 0045B7C6
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0045B7CD
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 0045B7D5
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0045B7EC
                                                          • MulDiv.KERNEL32(000009EC,?,?), ref: 0045B7FE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Release
                                                          • String ID:
                                                          • API String ID: 1035833867-0
                                                          • Opcode ID: e8a4a266755e065bcf82882bab04b7313908cea5161a3f7747e2bdf77f2db466
                                                          • Instruction ID: ebab011a078b8c66a555392ea924b50fda774449f62ca66a232c327e230173f3
                                                          • Opcode Fuzzy Hash: e8a4a266755e065bcf82882bab04b7313908cea5161a3f7747e2bdf77f2db466
                                                          • Instruction Fuzzy Hash: ED018475E00209BBEF109BE69C49A5EBFB8EB48711F00407AFE04A7291D6309C14CF94
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00420193
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 0042019B
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004201A6
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004201B1
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 004201B9
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 004201C1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: 8005da6f0a239fe7bb2d9a35262dc9c54b025e1879980d73ce2b9003a515eafd
                                                          • Instruction ID: 92342a6601e26d0a7fde7352a7d9a4d166513956845c1039e3d7dfd742296845
                                                          • Opcode Fuzzy Hash: 8005da6f0a239fe7bb2d9a35262dc9c54b025e1879980d73ce2b9003a515eafd
                                                          • Instruction Fuzzy Hash: BC016CB09017597DE3008F5A8C85B56FFA8FF19354F00411FA15C87941C7F5A868CBE5
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 004653F9
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0046540F
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 0046541E
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0046542D
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00465437
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0046543E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: 0a014705f4b9eef04d7cbb572d47effba07f9213880d12d67749b825beda7cb3
                                                          • Instruction ID: 8521796c5e9ebcca20b77e734ec20d152baa00e403791343a5e797bd2ed800e1
                                                          • Opcode Fuzzy Hash: 0a014705f4b9eef04d7cbb572d47effba07f9213880d12d67749b825beda7cb3
                                                          • Instruction Fuzzy Hash: 7EF06231240558BBD3215B929C0DEAF7A7CEFC6B11F00057DF904D1050EBA41A0587B9
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,?), ref: 00467243
                                                          • EnterCriticalSection.KERNEL32(?,?,00410EE4,?,?), ref: 00467254
                                                          • TerminateThread.KERNEL32(00000000,000001F6,?,00410EE4,?,?), ref: 00467261
                                                          • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00410EE4,?,?), ref: 0046726E
                                                            • Part of subcall function 00466C35: CloseHandle.KERNEL32(00000000,?,0046727B,?,00410EE4,?,?), ref: 00466C3F
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00467281
                                                          • LeaveCriticalSection.KERNEL32(?,?,00410EE4,?,?), ref: 00467288
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: 007701f69a9d5ed9de85b122c5e4605bf6e21b132c868c5f449004ca5f003f85
                                                          • Instruction ID: 24fb6cd7f7b8029ee4f25158e92bed301f8e8da2948c51d11c28ada49318010c
                                                          • Opcode Fuzzy Hash: 007701f69a9d5ed9de85b122c5e4605bf6e21b132c868c5f449004ca5f003f85
                                                          • Instruction Fuzzy Hash: DDF08236540A12EBD7111B64ED4C9DF7739FF45702B1009BAF503A10A0DB7F5819CB59
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0045899D
                                                          • UnloadUserProfile.USERENV(?,?), ref: 004589A9
                                                          • CloseHandle.KERNEL32(?), ref: 004589B2
                                                          • CloseHandle.KERNEL32(?), ref: 004589BA
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 004589C3
                                                          • HeapFree.KERNEL32(00000000), ref: 004589CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: fc20ddc87a5fd273a18fa8ef1565cbc608650ceaa5a7efc3272966d010428556
                                                          • Instruction ID: 8deadb4208ce055a946e280c670b0e99f3db2db319c6731f307d9ea981cf4585
                                                          • Opcode Fuzzy Hash: fc20ddc87a5fd273a18fa8ef1565cbc608650ceaa5a7efc3272966d010428556
                                                          • Instruction Fuzzy Hash: 94E0C236004401FBDA011FE1EC0C90ABB69FB89322B108A38F219C1074CB32A828DB58
                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00492C7C,?), ref: 004576EA
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00492C7C,?), ref: 00457702
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,0048FB80,000000FF,?,00000000,00000800,00000000,?,00492C7C,?), ref: 00457727
                                                          • _memcmp.LIBCMT ref: 00457748
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID: ,,I
                                                          • API String ID: 314563124-4163367948
                                                          • Opcode ID: 947aafcc5355d7d4454fef49f7e6cd79d9861281e848203aa0a317f96205b2d7
                                                          • Instruction ID: be765e1d57b8148d1cf66b3d68047348fb9be163096bbb02cdfcec4a4c199039
                                                          • Opcode Fuzzy Hash: 947aafcc5355d7d4454fef49f7e6cd79d9861281e848203aa0a317f96205b2d7
                                                          • Instruction Fuzzy Hash: 08815D71A00109EFCB00DFA4D984EEEB7B9FF89315F204469F505AB251DB75AE0ACB64
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00478613
                                                          • CharUpperBuffW.USER32(?,?), ref: 00478722
                                                          • VariantClear.OLEAUT32(?), ref: 0047889A
                                                            • Part of subcall function 00467562: VariantInit.OLEAUT32(00000000), ref: 004675A2
                                                            • Part of subcall function 00467562: VariantCopy.OLEAUT32(00000000,?), ref: 004675AB
                                                            • Part of subcall function 00467562: VariantClear.OLEAUT32(00000000), ref: 004675B7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4237274167-1221869570
                                                          • Opcode ID: 7eb3f6cd446d25451a520632f830be0f78651e26610ae4c76cefc4e8c14cd634
                                                          • Instruction ID: 60eff2204552638baa50968c5b1ec12482493ff8819337d84e8636a8f0030324
                                                          • Opcode Fuzzy Hash: 7eb3f6cd446d25451a520632f830be0f78651e26610ae4c76cefc4e8c14cd634
                                                          • Instruction Fuzzy Hash: E1916D756043019FC710EF25C48499BB7E4EF89718F14896EF88A9B3A2DB34ED06CB56
                                                          APIs
                                                            • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                                          • _memset.LIBCMT ref: 00462B87
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00462BB6
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00462C69
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00462C97
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                          • String ID: 0
                                                          • API String ID: 4152858687-4108050209
                                                          • Opcode ID: e0a3baeb209595a7aeaf3f34cda27616d709753c4c7b5672424de0a5229a163f
                                                          • Instruction ID: 8d65d54c91bb2834d650baaa5c58db0a2d3f708132dab7008ae6ceb83fe6ffca
                                                          • Opcode Fuzzy Hash: e0a3baeb209595a7aeaf3f34cda27616d709753c4c7b5672424de0a5229a163f
                                                          • Instruction Fuzzy Hash: BF51DD71208B01AED7249E28DA44A6F77E8EF44314F040A2FF880D7291EBB8DC44875B
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memmove$_free
                                                          • String ID: 3cA$_A
                                                          • API String ID: 2620147621-3480954128
                                                          • Opcode ID: fc79bb831323697d85a5635729b3fd95b30c12d258a38a46f5bd99e813b77d49
                                                          • Instruction ID: 850dd104c1974142ce8a52b298ec70faaced32133f8a19a743ede36878807482
                                                          • Opcode Fuzzy Hash: fc79bb831323697d85a5635729b3fd95b30c12d258a38a46f5bd99e813b77d49
                                                          • Instruction Fuzzy Hash: C7518C716043418FDB24CF29C840BABBBE1FF85304F49482EE98987351DB39E941CB4A
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memset$_memmove
                                                          • String ID: 3cA$ERCP
                                                          • API String ID: 2532777613-1471582817
                                                          • Opcode ID: f26897e622874a94d3a5be45ebb38ce857f1f7ed6e3ab2c2ed74d649e7167b68
                                                          • Instruction ID: eaf8e981165fb7e982de03985e75bf568e49202a02b644e32a28802e4b47c64a
                                                          • Opcode Fuzzy Hash: f26897e622874a94d3a5be45ebb38ce857f1f7ed6e3ab2c2ed74d649e7167b68
                                                          • Instruction Fuzzy Hash: 02518C71A00709DBDB24DF65C9817EBB7F4AF04304F2085AFE94A86241E778EA858B59
                                                          APIs
                                                          • _memset.LIBCMT ref: 004627C0
                                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 004627DC
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00462822
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,004C5890,00000000), ref: 0046286B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem_memset
                                                          • String ID: 0
                                                          • API String ID: 1173514356-4108050209
                                                          • Opcode ID: 0b59e6d123104e8f486f51701735be17c722a032adafe4466648fbe3018c70b5
                                                          • Instruction ID: 6162d5963bf1ca612739d8e457cf9df7481532cfa70a9704744149088ee17d1e
                                                          • Opcode Fuzzy Hash: 0b59e6d123104e8f486f51701735be17c722a032adafe4466648fbe3018c70b5
                                                          • Instruction Fuzzy Hash: F141AE70604701AFD720EF29CD44B1BBBE4AF84314F044A2EF96597391E7B8A905CB6B
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0047D7C5
                                                            • Part of subcall function 0040784B: _memmove.LIBCMT ref: 00407899
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower_memmove
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 3425801089-567219261
                                                          • Opcode ID: 85bf6583a6d5216460642c634f58536033cb8f756531c513cb924ba6ba7dc0f0
                                                          • Instruction ID: 0be9701992b4b91cd2e68042300235638f00ad80fed84879f118ea648425d64e
                                                          • Opcode Fuzzy Hash: 85bf6583a6d5216460642c634f58536033cb8f756531c513cb924ba6ba7dc0f0
                                                          • Instruction Fuzzy Hash: 783191719142159BCF00EF55CC919EEB3B4FF14324B108A2BE839A76D2DB39AD05CB95
                                                          APIs
                                                            • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                            • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00458F14
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00458F27
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00458F57
                                                            • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_memmove$ClassName
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 365058703-1403004172
                                                          • Opcode ID: 26bcd8e36ecd774e70687b5e39104e7c54a591b0b0fff073e1a0d1a726801d95
                                                          • Instruction ID: 808fcc3072a567dbeea6ba3b2dea5d83030b8b2133ef71414da725dc7de09f99
                                                          • Opcode Fuzzy Hash: 26bcd8e36ecd774e70687b5e39104e7c54a591b0b0fff073e1a0d1a726801d95
                                                          • Instruction Fuzzy Hash: 1021F572A00108BEDB14ABA19C45DFF7769DF05324B10462FF825B72E2DE3D180E9A28
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0047184C
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00471872
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 004718A2
                                                          • InternetCloseHandle.WININET(00000000), ref: 004718E9
                                                            • Part of subcall function 00472483: GetLastError.KERNEL32(?,?,00471817,00000000,00000000,00000001), ref: 00472498
                                                            • Part of subcall function 00472483: SetEvent.KERNEL32(?,?,00471817,00000000,00000000,00000001), ref: 004724AD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3113390036-3916222277
                                                          • Opcode ID: 6e03d3876d11c1f4078e21f2429e25c28f700f0be32576d9d2588f00842c0ae0
                                                          • Instruction ID: 9f195ba99928d8c49214c982579914efbee4b11eb605a7749f470a37591c6317
                                                          • Opcode Fuzzy Hash: 6e03d3876d11c1f4078e21f2429e25c28f700f0be32576d9d2588f00842c0ae0
                                                          • Instruction Fuzzy Hash: 1021B3B15002087FE711AF65DC85EFF77EDEB48748F10812FF44992250DA688D0957AA
                                                          APIs
                                                            • Part of subcall function 00401D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00401D73
                                                            • Part of subcall function 00401D35: GetStockObject.GDI32(00000011), ref: 00401D87
                                                            • Part of subcall function 00401D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00401D91
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00486461
                                                          • LoadLibraryW.KERNEL32(?), ref: 00486468
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0048647D
                                                          • DestroyWindow.USER32(?), ref: 00486485
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                          • String ID: SysAnimate32
                                                          • API String ID: 4146253029-1011021900
                                                          • Opcode ID: b969d8637368705cbd5fc3c3416812969f869cc3827cfeeeab454fcba1ebf117
                                                          • Instruction ID: 96a79e02294e314170444e54cb88eb83d8519b29eeb49143b64c907e724dd28e
                                                          • Opcode Fuzzy Hash: b969d8637368705cbd5fc3c3416812969f869cc3827cfeeeab454fcba1ebf117
                                                          • Instruction Fuzzy Hash: 2C219571110205BFEF506F64DC40EBF37ADEF54724F114A2AF91492190D739DC41A768
                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00466DBC
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00466DEF
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00466E01
                                                          • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00466E3B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: f98635b68cd5b0ab1880de70f3850fd061f65506a9295ae7d453fc561602cffb
                                                          • Instruction ID: cca2de9678abd998f0cd8c5114a45f7ff5fc269ace22cdb61a343b4aec1dc2fa
                                                          • Opcode Fuzzy Hash: f98635b68cd5b0ab1880de70f3850fd061f65506a9295ae7d453fc561602cffb
                                                          • Instruction Fuzzy Hash: 8B219274600209ABDB209F29DC05A9A77F8EF44720F214A2FFCA0D73D0EB759955CB5A
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00466E89
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00466EBB
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00466ECC
                                                          • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00466F06
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: f710eb54d58d972596414a75e1bad7db44e4d7afab8e48cef3b5ff9c2d25cc6d
                                                          • Instruction ID: 3a9fffd2e99ff55030e4788a991c608e9c08d8bb738c80722c17144d2858802a
                                                          • Opcode Fuzzy Hash: f710eb54d58d972596414a75e1bad7db44e4d7afab8e48cef3b5ff9c2d25cc6d
                                                          • Instruction Fuzzy Hash: 7B21C7795003059BDB209F69CC04A9B77A8EF44724F210B1EFCA0D33D0E7759851C75A
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0046AC54
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0046ACA8
                                                          • __swprintf.LIBCMT ref: 0046ACC1
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000,0048F910), ref: 0046ACFF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume__swprintf
                                                          • String ID: %lu
                                                          • API String ID: 3164766367-685833217
                                                          • Opcode ID: 1226eaab5c3aec93efd893ba7ce645b68cb4b14e47f6f225cd052cc4731cbfea
                                                          • Instruction ID: 026ba00fef41ead7d753cb67677e2cef5533d5e87c35db631ff5a0b10e4673a5
                                                          • Opcode Fuzzy Hash: 1226eaab5c3aec93efd893ba7ce645b68cb4b14e47f6f225cd052cc4731cbfea
                                                          • Instruction Fuzzy Hash: FE217470600109AFCB10EF65C945DAE77B8EF49318B10447EF905AB252DA35EE55CB25
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 0046115F
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 00461184
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 0046118E
                                                          • Sleep.KERNEL32(?,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 004611C1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID: @F
                                                          • API String ID: 2875609808-2781531706
                                                          • Opcode ID: fb156e6c77600c7f304348c8d1eac85c626a95be7b30d4d71b6c442a0f0d2560
                                                          • Instruction ID: bb6757969e877831e55d7075b4886ee1e071d58b2ed1133263d880316bc49dff
                                                          • Opcode Fuzzy Hash: fb156e6c77600c7f304348c8d1eac85c626a95be7b30d4d71b6c442a0f0d2560
                                                          • Instruction Fuzzy Hash: B5113071D0051DD7CF00DFA5D9486EEBB78FF0E711F04446ADA41B2250DB789954CB9A
                                                          APIs
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047EC07
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047EC37
                                                          • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0047ED6A
                                                          • CloseHandle.KERNEL32(?), ref: 0047EDEB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                          • String ID:
                                                          • API String ID: 2364364464-0
                                                          • Opcode ID: 0682de77952afe081ab9211739b9fa55dc0894d1ffd7185653a5878fd6647099
                                                          • Instruction ID: fffec5fe55f17e3d6af6322d033c5a61601868e7b6c72126a0bd4eac84abd099
                                                          • Opcode Fuzzy Hash: 0682de77952afe081ab9211739b9fa55dc0894d1ffd7185653a5878fd6647099
                                                          • Instruction Fuzzy Hash: F38191B16007009FD720EF29C846F6AB7E5AF48714F04C96EF999AB3D2D674AC44CB49
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                          • String ID:
                                                          • API String ID: 1559183368-0
                                                          • Opcode ID: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                          • Instruction ID: c535a9b74c3be08fb66675131960c2e3f57dfdec9721024cad96d7a05cd33cf3
                                                          • Opcode Fuzzy Hash: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                          • Instruction Fuzzy Hash: 9051BB30B00B15EBCB149E65F84066FB7B2AF40325F94472FF825963D4D7789D918B49
                                                          APIs
                                                            • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                            • Part of subcall function 00480E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004800FD
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0048013C
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00480183
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 004801AF
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 004801BC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                          • String ID:
                                                          • API String ID: 3440857362-0
                                                          • Opcode ID: 359206fcd8379e0793ee5fe764a6f8573afec8092144811008bc698b7cf463b9
                                                          • Instruction ID: 88ea7daa6ea56d794f8f44f15d5cebce8ee28ea1eb3ac59e56a3faba9080710b
                                                          • Opcode Fuzzy Hash: 359206fcd8379e0793ee5fe764a6f8573afec8092144811008bc698b7cf463b9
                                                          • Instruction Fuzzy Hash: 00517E71214204AFC704EF54C885E6FB7E8FF84318F40492EF595972A2DB39E909CB56
                                                          APIs
                                                            • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                            • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                          • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0047D927
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 0047D9AA
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 0047D9C6
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 0047DA07
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0047DA21
                                                            • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00467896,?,?,00000000), ref: 00405A2C
                                                            • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00467896,?,?,00000000,?,?), ref: 00405A50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 327935632-0
                                                          • Opcode ID: 06879a4796fb006db6701dcbeb08c84373d42f215ecc0ca78cf9e4c751ad0c13
                                                          • Instruction ID: 2e87ffb2dc156b6f817890f7ff3d29c7ed6bd27adfaf25e4966d104b6097512d
                                                          • Opcode Fuzzy Hash: 06879a4796fb006db6701dcbeb08c84373d42f215ecc0ca78cf9e4c751ad0c13
                                                          • Instruction Fuzzy Hash: C6512A75A00205DFCB00EFA9C4849AEB7B4FF09324B14C06AE959AB352D739AD45CF59
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0046E61F
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0046E648
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0046E687
                                                            • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                            • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0046E6AC
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0046E6B4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1389676194-0
                                                          • Opcode ID: ce3a5ebd9efaa8be180502ddb4eb8e69980282fa1457036a913740e8c9ea0622
                                                          • Instruction ID: 91bc9b0f2d422c2787d2346e32f4aa496c052f5f6ad9ddd010e4038a96899c27
                                                          • Opcode Fuzzy Hash: ce3a5ebd9efaa8be180502ddb4eb8e69980282fa1457036a913740e8c9ea0622
                                                          • Instruction Fuzzy Hash: 21514D75A00105DFCB01EF65C981AAEBBF5EF09314F1480AAE809AB3A2DB35ED11CF55
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 22afa8660c4250821daf86cd4b3c3329a23997c60e7bd91151dab5187926c109
                                                          • Instruction ID: 1d009f8157befd3e54c409f5ed609bf9f47d87f5e0fd5ad8ffda0b3aa488663e
                                                          • Opcode Fuzzy Hash: 22afa8660c4250821daf86cd4b3c3329a23997c60e7bd91151dab5187926c109
                                                          • Instruction Fuzzy Hash: A1419435904114ABE710FF24CC4CFAEBBA4EB09310F144A67E815A73E1C7B8AD65D75A
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00402357
                                                          • ScreenToClient.USER32(004C57B0,?), ref: 00402374
                                                          • GetAsyncKeyState.USER32(00000001), ref: 00402399
                                                          • GetAsyncKeyState.USER32(00000002), ref: 004023A7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: 68046f809d22b14954676cdf12726acdb6c494720a6fd25c838d2cb9e82985d9
                                                          • Instruction ID: 839f7de4dd1eaa7d0d5dffd0863558e2d4fc2f6d206a63eef28a724dc464cb27
                                                          • Opcode Fuzzy Hash: 68046f809d22b14954676cdf12726acdb6c494720a6fd25c838d2cb9e82985d9
                                                          • Instruction Fuzzy Hash: EB416135504115FBCF199FA9C848AEEBB74FB09364F20432BE825A22D0C7789D54DB95
                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004563E7
                                                          • TranslateAcceleratorW.USER32(?,?,?), ref: 00456433
                                                          • TranslateMessage.USER32(?), ref: 0045645C
                                                          • DispatchMessageW.USER32(?), ref: 00456466
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00456475
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                          • String ID:
                                                          • API String ID: 2108273632-0
                                                          • Opcode ID: a7c8caa960d18c36081a52289de371ede53fdfa9d0291adbc1963a0764221605
                                                          • Instruction ID: 5e30e11b4a1e50e6093782a7c3f18569847dc725279de51faeef3c0bd44cbf51
                                                          • Opcode Fuzzy Hash: a7c8caa960d18c36081a52289de371ede53fdfa9d0291adbc1963a0764221605
                                                          • Instruction Fuzzy Hash: 0A31A731500646AFDB648F74CC44FAB7BA8AB02306F95017AEC11C3262E729A4CDDB5D
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00458A30
                                                          • PostMessageW.USER32(?,00000201,00000001), ref: 00458ADA
                                                          • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00458AE2
                                                          • PostMessageW.USER32(?,00000202,00000000), ref: 00458AF0
                                                          • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00458AF8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: 0ca9fd056ca19cb6c90bb9abdc103f32fbac461099b2f563c45de53987908b56
                                                          • Instruction ID: 80642b6b9bd3aba6b5d9fb31be4e412888bcfd4668c130c4b2f9d35bc39c9ded
                                                          • Opcode Fuzzy Hash: 0ca9fd056ca19cb6c90bb9abdc103f32fbac461099b2f563c45de53987908b56
                                                          • Instruction Fuzzy Hash: 9831DF71500219EBDF14CFA8D94CA9E3BB5EB04316F10862EF924E72D2CBB49D18CB94
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 0045B204
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0045B221
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0045B259
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0045B27F
                                                          • _wcsstr.LIBCMT ref: 0045B289
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                          • String ID:
                                                          • API String ID: 3902887630-0
                                                          • Opcode ID: ccedf1314e292b33b4005b9315d2ae5abe8540abcd3cb28b079f820d5780fe89
                                                          • Instruction ID: 2c7352b259513f6215f8baf2ea9b1e154aa1926be373c141b5dda8785e83a564
                                                          • Opcode Fuzzy Hash: ccedf1314e292b33b4005b9315d2ae5abe8540abcd3cb28b079f820d5780fe89
                                                          • Instruction Fuzzy Hash: DF2103312042007BEB155B75AC09A7F7B98DB49711F10417EFC04DA262EF699C4597A8
                                                          APIs
                                                            • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0048B192
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0048B1B7
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0048B1CF
                                                          • GetSystemMetrics.USER32(00000004), ref: 0048B1F8
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00470E90,00000000), ref: 0048B216
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MetricsSystem
                                                          • String ID:
                                                          • API String ID: 2294984445-0
                                                          • Opcode ID: 4e73adee6138af7d1bf797c64f9d3d784d2b70968eee1b9af5d753c6da9745a2
                                                          • Instruction ID: a9241cd50f58f28df48e309b6b0d701528321bfcfd0e0dab973ca591f656860e
                                                          • Opcode Fuzzy Hash: 4e73adee6138af7d1bf797c64f9d3d784d2b70968eee1b9af5d753c6da9745a2
                                                          • Instruction Fuzzy Hash: D6218071910651AFCB10AF389C18A6F3BA4FB15361F144F3ABD32D72E0E73498618B98
                                                          APIs
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00459320
                                                            • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00459352
                                                          • __itow.LIBCMT ref: 0045936A
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00459392
                                                          • __itow.LIBCMT ref: 004593A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow$_memmove
                                                          • String ID:
                                                          • API String ID: 2983881199-0
                                                          • Opcode ID: 84fe632702548fb1505fa491271f0483b598e009c5f2d7716c087cfb082072c1
                                                          • Instruction ID: 968ba8743040f36d453ad30986a6980fa4fc6e9bba4f502b0ab074d445a6e810
                                                          • Opcode Fuzzy Hash: 84fe632702548fb1505fa491271f0483b598e009c5f2d7716c087cfb082072c1
                                                          • Instruction Fuzzy Hash: 0821F831B00204FBDB10AA618C85EAE3BA8EF4C715F14403AFD04E72C2D6B89D49979A
                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0040134D
                                                          • SelectObject.GDI32(?,00000000), ref: 0040135C
                                                          • BeginPath.GDI32(?), ref: 00401373
                                                          • SelectObject.GDI32(?,00000000), ref: 0040139C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 6eee13c9652aa66c46a5bd740bf4bc56e64492aa972ec1549dd75ab418036029
                                                          • Instruction ID: 345c33b4cc72e80acb91194012c3a0486190d93d7afc841094e42ad70741f55b
                                                          • Opcode Fuzzy Hash: 6eee13c9652aa66c46a5bd740bf4bc56e64492aa972ec1549dd75ab418036029
                                                          • Instruction Fuzzy Hash: 74215130800604DFEB10AF15DC04B6E7BA8FB00351F54463BF810A61F0D778A8A5DFA9
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00464ABA
                                                          • __beginthreadex.LIBCMT ref: 00464AD8
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 00464AED
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00464B03
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00464B0A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                          • String ID:
                                                          • API String ID: 3824534824-0
                                                          • Opcode ID: 6202b558f3b2a9591e93c05a74b6ac6320d8986f7eb6685660a047ad8363ccb0
                                                          • Instruction ID: dad7fb5640a7fc086676ad258fed45b246edcd9838203791acb142923f9e7505
                                                          • Opcode Fuzzy Hash: 6202b558f3b2a9591e93c05a74b6ac6320d8986f7eb6685660a047ad8363ccb0
                                                          • Instruction Fuzzy Hash: AC110876904214BBCB009FA8EC08E9F7FACEB85320F14427AF815D3350E679DD448BA9
                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0045821E
                                                          • GetLastError.KERNEL32(?,00457CE2,?,?,?), ref: 00458228
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00457CE2,?,?,?), ref: 00458237
                                                          • HeapAlloc.KERNEL32(00000000,?,00457CE2,?,?,?), ref: 0045823E
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00458255
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: cfd5187f71e7f5cd8bdbe136946f039270b76956d2ef1bbe7b4a41513b9fedde
                                                          • Instruction ID: ea2086197a74160409fd2b37e3cc6aadebf9925ef2750944b4d42ea2a50fea98
                                                          • Opcode Fuzzy Hash: cfd5187f71e7f5cd8bdbe136946f039270b76956d2ef1bbe7b4a41513b9fedde
                                                          • Instruction Fuzzy Hash: 5F012471200604AF9B204FA6DC88D6B7FACEF8A755B50097EF809D2220DE318C18CA64
                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?,?,00457455), ref: 00457127
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 00457142
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 00457150
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?), ref: 00457160
                                                          • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 0045716C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: 053515c948ca66986ad112422e3531eaba7e5432baa58b7069d320ef88250593
                                                          • Instruction ID: e33d562c89cd7b32e1c2ea0ad0b2255dbd3c00d864d4e8b233389f959c6fe991
                                                          • Opcode Fuzzy Hash: 053515c948ca66986ad112422e3531eaba7e5432baa58b7069d320ef88250593
                                                          • Instruction Fuzzy Hash: 9F01DF72600604BBCB105F68EC44BAE7BADEF44792F100079FD04D2321DB35DD088BA4
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00465260
                                                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0046526E
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00465276
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00465280
                                                          • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004652BC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: f570a565f6e5a323919ec457eb30d6746b1d20e306601747cbf76f1b2f538e79
                                                          • Instruction ID: 4ceb344e541e682f07f906f107c4893f4acd0a9012da7968cf5d6b0cf31b4d70
                                                          • Opcode Fuzzy Hash: f570a565f6e5a323919ec457eb30d6746b1d20e306601747cbf76f1b2f538e79
                                                          • Instruction Fuzzy Hash: 89015B71D01A19DBCF00DFE4DC585EEBB78FB09711F4004AAE941F2240DB3459548BAA
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00458121
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0045812B
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0045813A
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00458141
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00458157
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 9a4f6c5eb7810c0e88419f6a8d5d9273e391a222e84c7421f05042c8608bd2e6
                                                          • Instruction ID: c07733b115f7f4265118d5d6f8c893d5168d9180ec19ac620c451b64c6eb697f
                                                          • Opcode Fuzzy Hash: 9a4f6c5eb7810c0e88419f6a8d5d9273e391a222e84c7421f05042c8608bd2e6
                                                          • Instruction Fuzzy Hash: 71F0AF70200704AFEB110FA5EC88E6B3BACEF4A755B10043EF945D2250DF649C09DB64
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 0045C1F7
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 0045C20E
                                                          • MessageBeep.USER32(00000000), ref: 0045C226
                                                          • KillTimer.USER32(?,0000040A), ref: 0045C242
                                                          • EndDialog.USER32(?,00000001), ref: 0045C25C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: 4cc83a5054ee70337c3131b30a14a5b24bd9acd8f200e045765572ac389ab5c6
                                                          • Instruction ID: 1cbdf9da880a683b58ffeaf16326a4f2222d3a7c74a558aa9ab436c5b6b9af77
                                                          • Opcode Fuzzy Hash: 4cc83a5054ee70337c3131b30a14a5b24bd9acd8f200e045765572ac389ab5c6
                                                          • Instruction Fuzzy Hash: DF0167309047049BEB205B54DD8EB9A7778BB00706F000ABEB942A15E1DBF8699DDB59
                                                          APIs
                                                          • EndPath.GDI32(?), ref: 004013BF
                                                          • StrokeAndFillPath.GDI32(?,?,0043B888,00000000,?), ref: 004013DB
                                                          • SelectObject.GDI32(?,00000000), ref: 004013EE
                                                          • DeleteObject.GDI32 ref: 00401401
                                                          • StrokePath.GDI32(?), ref: 0040141C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: e3422339a15b844a04c007a3cb2e97a240e6e454912aa1f685e9751c28b57a09
                                                          • Instruction ID: 52848d70ea624aaff4fbf1a8dc35ad1b05fe5f58837c3e038025b123c59b5ab6
                                                          • Opcode Fuzzy Hash: e3422339a15b844a04c007a3cb2e97a240e6e454912aa1f685e9751c28b57a09
                                                          • Instruction Fuzzy Hash: E9F01930000A08EFDB516F26EC4CB5D3BA4A741326F188639E829981F1CB3459A9DF28
                                                          APIs
                                                            • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                                            • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                                            • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                            • Part of subcall function 00407A51: _memmove.LIBCMT ref: 00407AAB
                                                          • __swprintf.LIBCMT ref: 00412ECD
                                                          Strings
                                                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00412D66
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                          • API String ID: 1943609520-557222456
                                                          • Opcode ID: 9d263dc99e01ace67154297f196ed366977db671da04b9edd1b72bde1f802950
                                                          • Instruction ID: 5fa1cbf72f49bdff47ddac1708762697048697bfe45d30711dc422f43ccdaf03
                                                          • Opcode Fuzzy Hash: 9d263dc99e01ace67154297f196ed366977db671da04b9edd1b72bde1f802950
                                                          • Instruction Fuzzy Hash: AF91AD716083119FD714EF25D985CAFB7A8EF85314F00482FF441AB2A2DA78ED85CB5A
                                                          APIs
                                                          • OleSetContainedObject.OLE32(?,00000001), ref: 0045B4BE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ContainedObject
                                                          • String ID: AutoIt3GUI$Container$%I
                                                          • API String ID: 3565006973-4251005282
                                                          • Opcode ID: 859201fce2af07cea7d3cab38f5f66955440e88cc47174b58300a9c10060e76e
                                                          • Instruction ID: 7009c248d49ee490af6c5c3a89f60ad5612698b65dddc7868321d046ba5149c9
                                                          • Opcode Fuzzy Hash: 859201fce2af07cea7d3cab38f5f66955440e88cc47174b58300a9c10060e76e
                                                          • Instruction Fuzzy Hash: E6915B70200605AFDB14DF64C884B6ABBE5FF49705F20856EED46CB392EB74E845CBA4
                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 004250AD
                                                            • Part of subcall function 004300F0: __87except.LIBCMT ref: 0043012B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__87except__start
                                                          • String ID: pow
                                                          • API String ID: 2905807303-2276729525
                                                          • Opcode ID: 4113f970b40e4ddfad9eaf005de12111c539308e3198b2e3fd8f87d65f62cc15
                                                          • Instruction ID: 06df28618b400316a62ebb5dd7aba5b0962afb7cd5aceff72fbc56c90cb9ae17
                                                          • Opcode Fuzzy Hash: 4113f970b40e4ddfad9eaf005de12111c539308e3198b2e3fd8f87d65f62cc15
                                                          • Instruction Fuzzy Hash: 20518B20B0C50186DB217B24ED2137F2B909B44700F608AABE4D5863AADE3D8DD4DB8E
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: 3cA$_A
                                                          • API String ID: 4104443479-3480954128
                                                          • Opcode ID: 470fd055cd62c062cad60ef6c87f64deccec5063348adfb3c377f09d63a70252
                                                          • Instruction ID: c37b5588275ae9a3f9bfbb083816e01235b481b2fd059d6d91eac45173b7304a
                                                          • Opcode Fuzzy Hash: 470fd055cd62c062cad60ef6c87f64deccec5063348adfb3c377f09d63a70252
                                                          • Instruction Fuzzy Hash: 24516B70E006199FDB64CF68C880AAEBBB1FF44304F14852EE85AD7350EB39A995CB55
                                                          APIs
                                                            • Part of subcall function 004614BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00459296,?,?,00000034,00000800,?,00000034), ref: 004614E6
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0045983F
                                                            • Part of subcall function 00461487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,004592C5,?,?,00000800,?,00001073,00000000,?,?), ref: 004614B1
                                                            • Part of subcall function 004613DE: GetWindowThreadProcessId.USER32(?,?), ref: 00461409
                                                            • Part of subcall function 004613DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0045925A,00000034,?,?,00001004,00000000,00000000), ref: 00461419
                                                            • Part of subcall function 004613DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0045925A,00000034,?,?,00001004,00000000,00000000), ref: 0046142F
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004598AC
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004598F9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: 25131a85ebe6ddc6b48413ca47e37c1e8c65e46d0e1ba382f06cbd4a7eab333c
                                                          • Instruction ID: 83720f96416bb9890d74edf788c2ecf3a7fc11859df44560b8e2e1ee8df86db8
                                                          • Opcode Fuzzy Hash: 25131a85ebe6ddc6b48413ca47e37c1e8c65e46d0e1ba382f06cbd4a7eab333c
                                                          • Instruction Fuzzy Hash: 8E41627690021CBFDB10DFA5CC41EDEBBB8EB05300F14415AF945B7251DA746E89CBA5
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00487461
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00487475
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00487499
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: 61045321ac7bf12d5b8baadd1c1317b301de72fcd6e86f1e347c12b9b39caacc
                                                          • Instruction ID: a782af31bde95408328e4f00c38aa01da76ea549d3e2a3982252f7da8ca2871c
                                                          • Opcode Fuzzy Hash: 61045321ac7bf12d5b8baadd1c1317b301de72fcd6e86f1e347c12b9b39caacc
                                                          • Instruction Fuzzy Hash: CD21D032100218BBDF11DFA4CC42FEE3B69EB48724F210615FE156B190DA79EC918BA4
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00486D3B
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00486D4B
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00486D70
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: 751df69c11bbdcf7b5361d053624c448979b1fb0f20ab75c9448d7b30a168b5b
                                                          • Instruction ID: 4c3adc306d008ae433eb9b24af907097c824bc429f4b76309dac7fd9fc57b361
                                                          • Opcode Fuzzy Hash: 751df69c11bbdcf7b5361d053624c448979b1fb0f20ab75c9448d7b30a168b5b
                                                          • Instruction Fuzzy Hash: 0B21F232600118BFEF129F54CC45FAF3BBAEF89750F028529F940AB2A0C675AC5197A4
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00487772
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00487787
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00487794
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: 1c29657f45557683d1b312c07fddb74740427be331155a373290d3506167769a
                                                          • Instruction ID: f92afa797eeb34fec66cc861e9e49cfc52a42a3b8dc3c72e421b2ad803853977
                                                          • Opcode Fuzzy Hash: 1c29657f45557683d1b312c07fddb74740427be331155a373290d3506167769a
                                                          • Instruction Fuzzy Hash: 78112732204208BEEF106F61CC01FDF7768EF88B54F21052EFA41A21A0C275F851CB24
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: __calloc_crt
                                                          • String ID: K$@BL
                                                          • API String ID: 3494438863-2209178351
                                                          • Opcode ID: fc675e1694061d9c38afe518b907dae0cef97e15bff182515fce2e9d9647b47a
                                                          • Instruction ID: ecd99e2cd8c25bd978de89897c730db32a1f4afae71c84053b65a056749c41d4
                                                          • Opcode Fuzzy Hash: fc675e1694061d9c38afe518b907dae0cef97e15bff182515fce2e9d9647b47a
                                                          • Instruction Fuzzy Hash: 13F0A4713056318BE7A48F15BC51E9A6BD4EB40334F91006BE504CE280EB38B8818A9C
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00404BD0,?,00404DEF,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404C11
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00404C23
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-3689287502
                                                          • Opcode ID: 405154c16e2ccef9ecdbf58c32324ea843781b108d72a9dad8986559099558a3
                                                          • Instruction ID: 336b7b4d781913fc81d88f89c4603830af099844575e0fd289a57b9d24372fc6
                                                          • Opcode Fuzzy Hash: 405154c16e2ccef9ecdbf58c32324ea843781b108d72a9dad8986559099558a3
                                                          • Instruction Fuzzy Hash: 21D08C70500712CFD7206F70D90830BB6D5AF08352B118C3E9481D2690E6B8D8808728
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00404B83,?), ref: 00404C44
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00404C56
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-1355242751
                                                          • Opcode ID: ede2280b6c29169b17772aa7acd9e81a2ae4f3a09695aed7be4b1fdaf97be5ce
                                                          • Instruction ID: 94e8dd0119df68c591ce1b6916bf7291aa534648892bae55459e1f5a441e7c38
                                                          • Opcode Fuzzy Hash: ede2280b6c29169b17772aa7acd9e81a2ae4f3a09695aed7be4b1fdaf97be5ce
                                                          • Instruction Fuzzy Hash: 05D0C270500713CFD7206F31C80830A72D4AF00351B218C3F9591D62A8E678D8C0C728
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,00481039), ref: 00480DF5
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00480E07
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2574300362-4033151799
                                                          • Opcode ID: fae212b9462cf56759409cc1f58fb8eb23c0b65c0082e346e03b2c3ad688c6db
                                                          • Instruction ID: d6bbf1028a7b4fc64c7871010167997e003500dc78b62918f38a53d73d50c6ba
                                                          • Opcode Fuzzy Hash: fae212b9462cf56759409cc1f58fb8eb23c0b65c0082e346e03b2c3ad688c6db
                                                          • Instruction Fuzzy Hash: ACD08231560322DFC320AF70C80838B72E4AF04342F208C3E9582C2250E6B8D8948B28
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00478CF4,?,0048F910), ref: 004790EE
                                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00479100
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetModuleHandleExW$kernel32.dll
                                                          • API String ID: 2574300362-199464113
                                                          • Opcode ID: f050257f1e698f793cf4ceeb70369fd3548485a42f655611e5c8aa441dfab454
                                                          • Instruction ID: 12f83e0466186043ebac617d8a25d984f844cdccf99b41ce397239b1d45cf92f
                                                          • Opcode Fuzzy Hash: f050257f1e698f793cf4ceeb70369fd3548485a42f655611e5c8aa441dfab454
                                                          • Instruction Fuzzy Hash: E6D0EC34510723DFD7209B35D81C64A76D4AF05751B51CC3E9485D6650E678D894C754
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: LocalTime__swprintf
                                                          • String ID: %.3d$WIN_XPe
                                                          • API String ID: 2070861257-2409531811
                                                          • Opcode ID: 4c24db5f6d1ae0e835b3c0d7d74f6f6d97c26fe48fb6e8bef9c505129785ad3d
                                                          • Instruction ID: f51e3ac8fae6d8955d529539db48231027d4147bdd6b48c6978ef66e561906ab
                                                          • Opcode Fuzzy Hash: 4c24db5f6d1ae0e835b3c0d7d74f6f6d97c26fe48fb6e8bef9c505129785ad3d
                                                          • Instruction Fuzzy Hash: D2D01271844118FAD7109B9098898F9737CA708301F600563B512A2050E23E9BD6E62E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b67f0641d69e682f3dbeb5e9524b3f3136514ebd375aeb5d2f23f0fb20905a0f
                                                          • Instruction ID: 13cbbea2f029a5b6ef5998baa1d0dcecb81b6aaeffd6b1af622dda72ce090ed1
                                                          • Opcode Fuzzy Hash: b67f0641d69e682f3dbeb5e9524b3f3136514ebd375aeb5d2f23f0fb20905a0f
                                                          • Instruction Fuzzy Hash: B9C19C74A04216EFCB14CFA4D884AAEBBB5FF48311B1085A9EC05DB352D734ED85DB94
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?), ref: 0047E0BE
                                                          • CharLowerBuffW.USER32(?,?), ref: 0047E101
                                                            • Part of subcall function 0047D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0047D7C5
                                                          • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0047E301
                                                          • _memmove.LIBCMT ref: 0047E314
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower$AllocVirtual_memmove
                                                          • String ID:
                                                          • API String ID: 3659485706-0
                                                          • Opcode ID: ab9ce05aaf7ef72e75967f5c2c9fbff63471ebc438e10ba653b3ae7d5a8a630c
                                                          • Instruction ID: 42d1ff19b42d4dd855f78dbf13e3d8c427035282adcdd002c13888698d5010eb
                                                          • Opcode Fuzzy Hash: ab9ce05aaf7ef72e75967f5c2c9fbff63471ebc438e10ba653b3ae7d5a8a630c
                                                          • Instruction Fuzzy Hash: 91C16A71604301DFC714DF29C48096ABBE4FF89318F148AAEF8999B352D734E946CB86
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 004780C3
                                                          • CoUninitialize.OLE32 ref: 004780CE
                                                            • Part of subcall function 0045D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0045D5D4
                                                          • VariantInit.OLEAUT32(?), ref: 004780D9
                                                          • VariantClear.OLEAUT32(?), ref: 004783AA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                          • String ID:
                                                          • API String ID: 780911581-0
                                                          • Opcode ID: 146b06d0ccda97621068481867dda55264d3b4f6e553a8e7a39d32f8a9431655
                                                          • Instruction ID: 8f3373c4a7a5232ad993fe33ba140746eecbff111afdbebb2f840ccc5d4b94f2
                                                          • Opcode Fuzzy Hash: 146b06d0ccda97621068481867dda55264d3b4f6e553a8e7a39d32f8a9431655
                                                          • Instruction Fuzzy Hash: 2CA17C756047019FCB10EF15C485B6AB7E4BF89758F04845EF999AB3A2CB38EC05CB4A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Variant$AllocClearCopyInitString
                                                          • String ID:
                                                          • API String ID: 2808897238-0
                                                          • Opcode ID: 126b7732d1169b0daeb476a90690a6342f420379eaa699d7f5cc7697427e96b0
                                                          • Instruction ID: e8b204b61dde8909cc9ebe033208aa5324eaf332f6d31eb9d5c273134af525d6
                                                          • Opcode Fuzzy Hash: 126b7732d1169b0daeb476a90690a6342f420379eaa699d7f5cc7697427e96b0
                                                          • Instruction Fuzzy Hash: 9551C5747003019BDB20AF66D49162AB3E5AF45315F61C82FE986EB293DA38DC49870D
                                                          APIs
                                                          • GetWindowRect.USER32(00C36F58,?), ref: 00489863
                                                          • ScreenToClient.USER32(00000002,00000002), ref: 00489896
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00489903
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: 64022f8d4441c5f1557efdd9fcc3a986e2e7d97cfab57cf70d5a2593d4a8891b
                                                          • Instruction ID: e3f881a7cdcc43810cee46c2a40b043201eea1d37e41385612dd6f56ef4f9ac2
                                                          • Opcode Fuzzy Hash: 64022f8d4441c5f1557efdd9fcc3a986e2e7d97cfab57cf70d5a2593d4a8891b
                                                          • Instruction Fuzzy Hash: 6B513E74A00609AFCB10EF54C884ABE7BB5FF45360F14866EF855AB3A0D734AD91CB94
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 004769D1
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 004769E1
                                                            • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                            • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00476A45
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00476A51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$__itow__swprintfsocket
                                                          • String ID:
                                                          • API String ID: 2214342067-0
                                                          • Opcode ID: 5f9ca6de3472ca1f7af679026d0f929c5a37830e5e67d00f46ee422ea10bce61
                                                          • Instruction ID: c17afa0f8bd668a9c60690327d1e2da2a99666ddae487d2dea1163d2ceff8f1e
                                                          • Opcode Fuzzy Hash: 5f9ca6de3472ca1f7af679026d0f929c5a37830e5e67d00f46ee422ea10bce61
                                                          • Instruction Fuzzy Hash: A241C175740200AFEB50BF25CC86F6A37A49F05B18F04C56EFA59AB3C3DA789D008B59
                                                          APIs
                                                          • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0048F910), ref: 004764A7
                                                          • _strlen.LIBCMT ref: 004764D9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID:
                                                          • API String ID: 4218353326-0
                                                          • Opcode ID: 01455ef8c868b87f5fb28c9aef07a253f5b7e9d17fabbbc863442210fbad6251
                                                          • Instruction ID: ea6fe9a4da80eb7d3c3fcd9d99711482a179dafd9654a2bb84a00921c454041b
                                                          • Opcode Fuzzy Hash: 01455ef8c868b87f5fb28c9aef07a253f5b7e9d17fabbbc863442210fbad6251
                                                          • Instruction Fuzzy Hash: F341B971600104ABCB14EB65EC85EEEB7AAAF44314F51C16FF919A72D3DB38AD04CB58
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0046B89E
                                                          • GetLastError.KERNEL32(?,00000000), ref: 0046B8C4
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0046B8E9
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0046B915
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 8c509dae0351cb0f1ead8c0d9691e3f66f8983daa8a4ab2c48e0df630e8b2899
                                                          • Instruction ID: 5b86d2e11fb278bd4ab993ead48be06bf9d9dcf949e57147c6f090c5708de813
                                                          • Opcode Fuzzy Hash: 8c509dae0351cb0f1ead8c0d9691e3f66f8983daa8a4ab2c48e0df630e8b2899
                                                          • Instruction Fuzzy Hash: C441097A600610DFCB11EF15C444A59BBE1EF49314F05C0AAEC4AAB3A2DB38FD45CB99
                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004888DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: dfc2a81b006da7d210676277332af1fb5d08ccb7ab45ec99ede0666f4995ae78
                                                          • Instruction ID: 90478ffdb7761b137305382920b909693c76b6b3f52a4c92a5928a084f4746aa
                                                          • Opcode Fuzzy Hash: dfc2a81b006da7d210676277332af1fb5d08ccb7ab45ec99ede0666f4995ae78
                                                          • Instruction Fuzzy Hash: FA31E574600109AEEB20BA18CC45FBE77A4FB09310FD4492FF911E62A1CB78A9409B5F
                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 0048AB60
                                                          • GetWindowRect.USER32(?,?), ref: 0048ABD6
                                                          • PtInRect.USER32(?,?,0048C014), ref: 0048ABE6
                                                          • MessageBeep.USER32(00000000), ref: 0048AC57
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: b992c4d65db1967464bf88d38174ccb0aa2b8d75632d23dd7873dfcfb3d19eff
                                                          • Instruction ID: 50dfaebed92d8c5328ac5b6136a8f20cc44f4ea80b7df437f97558f7e7d7bb38
                                                          • Opcode Fuzzy Hash: b992c4d65db1967464bf88d38174ccb0aa2b8d75632d23dd7873dfcfb3d19eff
                                                          • Instruction Fuzzy Hash: BA419130600118DFEB11EF58D884A6E7BF5FB48300F1888BBE9149B361D7B4E861CB5A
                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00460B27
                                                          • SetKeyboardState.USER32(00000080,?,00000001), ref: 00460B43
                                                          • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00460BA9
                                                          • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00460BFB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: ad743076a504700ecfcd0b291c1b9b7b7440be96a9dfed4adad831221a9f942d
                                                          • Instruction ID: 03210f4579a9838ef25ae451a3721c68a31d2690f75eb3d3b5678938ddfb0b3b
                                                          • Opcode Fuzzy Hash: ad743076a504700ecfcd0b291c1b9b7b7440be96a9dfed4adad831221a9f942d
                                                          • Instruction Fuzzy Hash: 65315970D402086EFB308AA98C05BFFBBA5AB45718F08826BE491512D2E37DA945975F
                                                          APIs
                                                          • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 00460C66
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00460C82
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 00460CE1
                                                          • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 00460D33
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: db42d93e8e195687caca85855f7745e2d87a2e1a1f23b639b912e2236a781201
                                                          • Instruction ID: af81f782b9f2afb763cf5164547ef1363043bc47ca8f91e08b3a13bd089ac861
                                                          • Opcode Fuzzy Hash: db42d93e8e195687caca85855f7745e2d87a2e1a1f23b639b912e2236a781201
                                                          • Instruction Fuzzy Hash: 963135309402086EFF388B658804BBFBB66EB45310F04472FE481622D1E33D9949D75B
                                                          APIs
                                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004361FB
                                                          • __isleadbyte_l.LIBCMT ref: 00436229
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00436257
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0043628D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                          • String ID:
                                                          • API String ID: 3058430110-0
                                                          • Opcode ID: a60c1041aab017ddab1c5084f57e160f63eb243bd769fe5892fd9e0978686beb
                                                          • Instruction ID: a268d3a3e6e94a3a382490fbdf87b59e774afa85b5b6ffc4d13239602402ad5c
                                                          • Opcode Fuzzy Hash: a60c1041aab017ddab1c5084f57e160f63eb243bd769fe5892fd9e0978686beb
                                                          • Instruction Fuzzy Hash: 8831E230600246BFDF219F65CC48B6B7BB9BF4A310F17906AE82487291DB34D850D754
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 00484F02
                                                            • Part of subcall function 00463641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0046365B
                                                            • Part of subcall function 00463641: GetCurrentThreadId.KERNEL32 ref: 00463662
                                                            • Part of subcall function 00463641: AttachThreadInput.USER32(00000000,?,00465005), ref: 00463669
                                                          • GetCaretPos.USER32(?), ref: 00484F13
                                                          • ClientToScreen.USER32(00000000,?), ref: 00484F4E
                                                          • GetForegroundWindow.USER32 ref: 00484F54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: 66b1f3ac083da855331d928d4446481d114f1a3fb54dcb21d0b34bab5917c058
                                                          • Instruction ID: 1d2def75fb9c8d520c96e6582531674793c8a8545b0fc50cd96dbe06c6996e1e
                                                          • Opcode Fuzzy Hash: 66b1f3ac083da855331d928d4446481d114f1a3fb54dcb21d0b34bab5917c058
                                                          • Instruction Fuzzy Hash: 38314FB2D00108AFCB00EFA6C8819EFB7F9EF84304F00446EE515E7242EA759E058BA5
                                                          APIs
                                                            • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                          • GetCursorPos.USER32(?), ref: 0048C4D2
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0043B9AB,?,?,?,?,?), ref: 0048C4E7
                                                          • GetCursorPos.USER32(?), ref: 0048C534
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0043B9AB,?,?,?), ref: 0048C56E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: eaef0c60606744c236617b72f069d6ac48e9dc0c7f64b6eecf554375fb646ea5
                                                          • Instruction ID: 2973952025af683afbaf652597196eb0b77ee17814688135882e4792ee887bd6
                                                          • Opcode Fuzzy Hash: eaef0c60606744c236617b72f069d6ac48e9dc0c7f64b6eecf554375fb646ea5
                                                          • Instruction Fuzzy Hash: CE319335500028FFCF159F58C898EAF7BB5EB09310F44486AF9059B361C735AD50DBA8
                                                          APIs
                                                            • Part of subcall function 0045810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00458121
                                                            • Part of subcall function 0045810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0045812B
                                                            • Part of subcall function 0045810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0045813A
                                                            • Part of subcall function 0045810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00458141
                                                            • Part of subcall function 0045810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00458157
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 004586A3
                                                          • _memcmp.LIBCMT ref: 004586C6
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004586FC
                                                          • HeapFree.KERNEL32(00000000), ref: 00458703
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: 2c5cbc444dc25df1d3482cf24a588846e82523edbc0970691195306e100f3dfe
                                                          • Instruction ID: 730e04a0c9a28b219d77ec22e6a84493cb1498a8cd35620125a6bebab32f77ad
                                                          • Opcode Fuzzy Hash: 2c5cbc444dc25df1d3482cf24a588846e82523edbc0970691195306e100f3dfe
                                                          • Instruction Fuzzy Hash: E4215A71E01109EBDB10DFA4C989BAEB7B8EF45306F15405EE844AB242DB34AE09CB58
                                                          APIs
                                                          • __setmode.LIBCMT ref: 004209AE
                                                            • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00467896,?,?,00000000), ref: 00405A2C
                                                            • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00467896,?,?,00000000,?,?), ref: 00405A50
                                                          • _fprintf.LIBCMT ref: 004209E5
                                                          • OutputDebugStringW.KERNEL32(?), ref: 00455DBB
                                                            • Part of subcall function 00424AAA: _flsall.LIBCMT ref: 00424AC3
                                                          • __setmode.LIBCMT ref: 00420A1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                          • String ID:
                                                          • API String ID: 521402451-0
                                                          • Opcode ID: f8cbf8bec01b3a097d2808ee2000faaa12c69a290c37b152d83dab8e3784db7b
                                                          • Instruction ID: 506474fa098cb1490a8c63a0929ef03edd2b6c88ff5c0dc42923ee6bdce5b67a
                                                          • Opcode Fuzzy Hash: f8cbf8bec01b3a097d2808ee2000faaa12c69a290c37b152d83dab8e3784db7b
                                                          • Instruction Fuzzy Hash: E31126727041146FDB04B2A5BC469BE77A8DF81318FA0416FF105632C3EE3C5946879D
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 004717A3
                                                            • Part of subcall function 0047182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0047184C
                                                            • Part of subcall function 0047182D: InternetCloseHandle.WININET(00000000), ref: 004718E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Internet$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 1463438336-0
                                                          • Opcode ID: 0d77803af34525429c563aa5a91095bc3ad4b0cccef2d99c89baa2dfe7cd75a8
                                                          • Instruction ID: 71b6e4b1fe2b952a6419c9952bf0f018ffc457c15b1f1ac8131077084853f328
                                                          • Opcode Fuzzy Hash: 0d77803af34525429c563aa5a91095bc3ad4b0cccef2d99c89baa2dfe7cd75a8
                                                          • Instruction Fuzzy Hash: 1121C235200601BFEB169F648C01FFBBBA9FF48710F10842FF91996660D775D815A7A9
                                                          APIs
                                                          • _free.LIBCMT ref: 00435101
                                                            • Part of subcall function 0042571C: __FF_MSGBANNER.LIBCMT ref: 00425733
                                                            • Part of subcall function 0042571C: __NMSG_WRITE.LIBCMT ref: 0042573A
                                                            • Part of subcall function 0042571C: RtlAllocateHeap.NTDLL(00C10000,00000000,00000001,?,00000000,00000001,?,00420DD3,?,00000000,%I,?,00409E8C,?,?,?), ref: 0042575F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: a8023bd45059f91bbc3ba768b53d43d26a35538f988b85c4c1a404ec765a44f4
                                                          • Instruction ID: 565aca9384bc55ec46628ce6f4316e74187f5c3bb682111b66b5609c454c8c26
                                                          • Opcode Fuzzy Hash: a8023bd45059f91bbc3ba768b53d43d26a35538f988b85c4c1a404ec765a44f4
                                                          • Instruction Fuzzy Hash: D411E072E01A21AECF313FB1BC05B5E3B989B183A5F50593FF9049A250DE3C89418B9C
                                                          APIs
                                                            • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00467896,?,?,00000000), ref: 00405A2C
                                                            • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00467896,?,?,00000000,?,?), ref: 00405A50
                                                          • gethostbyname.WSOCK32(?,?,?), ref: 00476399
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 004763A4
                                                          • _memmove.LIBCMT ref: 004763D1
                                                          • inet_ntoa.WSOCK32(?), ref: 004763DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                          • String ID:
                                                          • API String ID: 1504782959-0
                                                          • Opcode ID: 762733e25637bc439446b3da9c5912462bd92284ca480afd830ba0cdb0608b85
                                                          • Instruction ID: c304d0e6e06ed5b692ae79d4b0fe9c52f6c8e6d6f1456e813eafe14ad56adccd
                                                          • Opcode Fuzzy Hash: 762733e25637bc439446b3da9c5912462bd92284ca480afd830ba0cdb0608b85
                                                          • Instruction Fuzzy Hash: F2114F71600109AFCB00FBA5D946CEE77B9EF04314B54847AF505B72A2DB389E14CB69
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00458B61
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00458B73
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00458B89
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00458BA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: ca17c677d33199d8ade5de32726d6ec6320cad89c97852bedaa9fe676a546a7f
                                                          • Instruction ID: 6d6e4feeaee75d02a1ec4dd614e497ad2765f264ac6e3ed00c825e9843e5ba14
                                                          • Opcode Fuzzy Hash: ca17c677d33199d8ade5de32726d6ec6320cad89c97852bedaa9fe676a546a7f
                                                          • Instruction Fuzzy Hash: 56113A79900218BFDB10DB95C884EAEBB78EB48710F2041A6E900B7250DA716E15DB94
                                                          APIs
                                                            • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                          • DefDlgProcW.USER32(?,00000020,?), ref: 004012D8
                                                          • GetClientRect.USER32(?,?), ref: 0043B5FB
                                                          • GetCursorPos.USER32(?), ref: 0043B605
                                                          • ScreenToClient.USER32(?,?), ref: 0043B610
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 4127811313-0
                                                          • Opcode ID: 1c8f769d0dee53fb8c778101d630ad27ed939e462680dcfd79beede70ddeeb32
                                                          • Instruction ID: ee9d34d9398b5f91fab5137b757b2ab9dbcc007e8162b1c14587a54292e2d527
                                                          • Opcode Fuzzy Hash: 1c8f769d0dee53fb8c778101d630ad27ed939e462680dcfd79beede70ddeeb32
                                                          • Instruction Fuzzy Hash: 39112B39510059FBCB00EF99D8899AE77B8FB05300F4008AAF901F7291D734BA569BA9
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0045D84D
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 0045D864
                                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 0045D879
                                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 0045D897
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Type$Register$FileLoadModuleNameUser
                                                          • String ID:
                                                          • API String ID: 1352324309-0
                                                          • Opcode ID: f854c2ae4ddfb44975126c45fe272911be12f4fa913ee62eb5c826514f2548e5
                                                          • Instruction ID: 3b05f8a101c890c8fbc83375acaac98503a8deaba450bce75694a4266b83033e
                                                          • Opcode Fuzzy Hash: f854c2ae4ddfb44975126c45fe272911be12f4fa913ee62eb5c826514f2548e5
                                                          • Instruction Fuzzy Hash: 48115E75A05304DBE330AF50EC08F97BBBCEF00B01F10896EA926D6151D7B4E94D9BA5
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                          • String ID:
                                                          • API String ID: 3016257755-0
                                                          • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                          • Instruction ID: 3d94be51af7e819a6a5def82be0e086b27bd99855e7e965629bee2c507946819
                                                          • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                          • Instruction Fuzzy Hash: 78014EB244414ABBCF2A5E84CC41CEE3F72BB1C354F599416FA9858131D23AD9B1AB85
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 0048B2E4
                                                          • ScreenToClient.USER32(?,?), ref: 0048B2FC
                                                          • ScreenToClient.USER32(?,?), ref: 0048B320
                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0048B33B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: e8173e98fc73e507b6a04d2f7e54522757b65c9b70d93ac78b94b59699abf8f9
                                                          • Instruction ID: e0f35f64d62337ec24ef524e52db7040af9c6cc02db1932b8591958b9ea84988
                                                          • Opcode Fuzzy Hash: e8173e98fc73e507b6a04d2f7e54522757b65c9b70d93ac78b94b59699abf8f9
                                                          • Instruction Fuzzy Hash: B9117775D00209EFDB01DF99C444AEEBBF5FF18310F104566E914E3220D735AA558F94
                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00466BE6
                                                            • Part of subcall function 004676C4: _memset.LIBCMT ref: 004676F9
                                                          • _memmove.LIBCMT ref: 00466C09
                                                          • _memset.LIBCMT ref: 00466C16
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00466C26
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection_memset$EnterLeave_memmove
                                                          • String ID:
                                                          • API String ID: 48991266-0
                                                          • Opcode ID: edf19e1ede3b3e611382947217f22c9f8674c26c836af00265cbaa5f5bcd5e3d
                                                          • Instruction ID: 06c116e41b1fbc97defe022da98efa456519ca017efd3746de7cd937a477406a
                                                          • Opcode Fuzzy Hash: edf19e1ede3b3e611382947217f22c9f8674c26c836af00265cbaa5f5bcd5e3d
                                                          • Instruction Fuzzy Hash: ACF0547A200110BBCF016F56EC85A8ABF29EF45325F4480A9FE085E227D775E811CBB9
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 00402231
                                                          • SetTextColor.GDI32(?,000000FF), ref: 0040223B
                                                          • SetBkMode.GDI32(?,00000001), ref: 00402250
                                                          • GetStockObject.GDI32(00000005), ref: 00402258
                                                          • GetWindowDC.USER32(?,00000000), ref: 0043BE83
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 0043BE90
                                                          • GetPixel.GDI32(00000000,?,00000000), ref: 0043BEA9
                                                          • GetPixel.GDI32(00000000,00000000,?), ref: 0043BEC2
                                                          • GetPixel.GDI32(00000000,?,?), ref: 0043BEE2
                                                          • ReleaseDC.USER32(?,00000000), ref: 0043BEED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                          • String ID:
                                                          • API String ID: 1946975507-0
                                                          • Opcode ID: 1c24b0d26c008fe2912d49eeb423ba9ae618f885d5077ddc5dea034ec8dbd8ce
                                                          • Instruction ID: 54194c7dea5641a5760446fc0b471bd43188e270dcc7ade6c1867ff591c8ccba
                                                          • Opcode Fuzzy Hash: 1c24b0d26c008fe2912d49eeb423ba9ae618f885d5077ddc5dea034ec8dbd8ce
                                                          • Instruction Fuzzy Hash: 8FE03932104244EADB215FA8EC4D7D93B10EB05332F10837AFB69980E187B54994DB16
                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 0045871B
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,004582E6), ref: 00458722
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,004582E6), ref: 0045872F
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,004582E6), ref: 00458736
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: c13fcb7cbc4fcf9024c8800305f1294cb96d5ee06e78be5c1b908a636c14961a
                                                          • Instruction ID: 27e516f12521b82670cd12e73380cd235ac9fe5f10b87aab6d4880cb8d6f589a
                                                          • Opcode Fuzzy Hash: c13fcb7cbc4fcf9024c8800305f1294cb96d5ee06e78be5c1b908a636c14961a
                                                          • Instruction Fuzzy Hash: 69E086366113119FD7205FB45D0CB5B3BACEF55792F244C3CB645D9051DA388449C754
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: %I
                                                          • API String ID: 0-63094095
                                                          • Opcode ID: df8926bba193f86d7530d48bae52e03e3f0f5447670d79ef27430f853165141e
                                                          • Instruction ID: fc9b66e0bafda5900f64632d1c19c64e360ede111f7e08ffc6918f9b7723571d
                                                          • Opcode Fuzzy Hash: df8926bba193f86d7530d48bae52e03e3f0f5447670d79ef27430f853165141e
                                                          • Instruction Fuzzy Hash: F7B19D759001099ACF24EF95C8819EEB7B5EF44314F11403BE942B72D1DB3C9AA6CB9E
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: __itow_s
                                                          • String ID: xbL$xbL
                                                          • API String ID: 3653519197-3351732020
                                                          • Opcode ID: da92b485cce2626ab64eabfa64daaed038194f15287f05380521b28832e8ebf0
                                                          • Instruction ID: dfe480003ad9fd5cab9b7df9ebde8448aad3da8901d64dd9d19fd2ed475b7079
                                                          • Opcode Fuzzy Hash: da92b485cce2626ab64eabfa64daaed038194f15287f05380521b28832e8ebf0
                                                          • Instruction Fuzzy Hash: DFB16E70A00105EFCB14DF55C890EEAB7B9EF58344F14C46AF949AB291EB38E941CB99
                                                          APIs
                                                            • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                                            • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                            • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                          • __wcsnicmp.LIBCMT ref: 0046B02D
                                                          • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0046B0F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                          • String ID: LPT
                                                          • API String ID: 3222508074-1350329615
                                                          • Opcode ID: 22386211fa87ba6f25b54d14b3f4bab1e3a1f04917f9a9de026b4ee2e74de440
                                                          • Instruction ID: 83c5630e61c03cc96fa61f6b78faa4233f6e1162f12f5b466cba6b991e1c6364
                                                          • Opcode Fuzzy Hash: 22386211fa87ba6f25b54d14b3f4bab1e3a1f04917f9a9de026b4ee2e74de440
                                                          • Instruction Fuzzy Hash: EF617475A00215AFCB14DF54C851EEEB7B4EF09350F10806AF916EB391E738AE85CB99
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 00412968
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 00412981
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: cf15a7ea090bffc9490279112080cc94ce2022ef9ba38fcf57aa55417a2360bc
                                                          • Instruction ID: a5a81f9d260a569e77baff687d6fe7a0f73e349ca0d117409dcb6840122a66be
                                                          • Opcode Fuzzy Hash: cf15a7ea090bffc9490279112080cc94ce2022ef9ba38fcf57aa55417a2360bc
                                                          • Instruction Fuzzy Hash: CB5159B24187449BD320EF15D885BAFBBE8FB85344F41886DF2D8911A1DB74892CCB5A
                                                          APIs
                                                            • Part of subcall function 00404F0B: __fread_nolock.LIBCMT ref: 00404F29
                                                          • _wcscmp.LIBCMT ref: 00469824
                                                          • _wcscmp.LIBCMT ref: 00469837
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$__fread_nolock
                                                          • String ID: FILE
                                                          • API String ID: 4029003684-3121273764
                                                          • Opcode ID: 61b9d9cc128ec34272c66af4fd2f1fdd343520f55c014a8993afaf0baf9333d9
                                                          • Instruction ID: cde52b3ca8712c625de002da450250744642bb9d8a04c3b997614ed6dba67ccd
                                                          • Opcode Fuzzy Hash: 61b9d9cc128ec34272c66af4fd2f1fdd343520f55c014a8993afaf0baf9333d9
                                                          • Instruction Fuzzy Hash: 8C41A771A0021ABADF20AAA5CC45FEF77BDDF85714F00047EB604B7181DA79AD058B69
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID: DdL$DdL
                                                          • API String ID: 1473721057-91670653
                                                          • Opcode ID: c0a4b12d34a2949c4f0399b8a32a882820cb71d7b6b526698ba9514fc12a179e
                                                          • Instruction ID: 8cf85b897da21b35b232154f37a53a393289a03a8f02d27ab87a98346ee69310
                                                          • Opcode Fuzzy Hash: c0a4b12d34a2949c4f0399b8a32a882820cb71d7b6b526698ba9514fc12a179e
                                                          • Instruction Fuzzy Hash: 5D5113B86043019FD754DF18C580A1ABBF1BF99344F54886EE9859B3A1D339EC91CF4A
                                                          APIs
                                                          • _memset.LIBCMT ref: 0047259E
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 004725D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_memset
                                                          • String ID: |
                                                          • API String ID: 1413715105-2343686810
                                                          • Opcode ID: 57f61fd01a308bda18669db1d90637b579712718f35f37a6001f1c43c21cdce8
                                                          • Instruction ID: 4adfb47e446f893ace23fd506e663b8e952a67a31115c745ae406753cf5a670a
                                                          • Opcode Fuzzy Hash: 57f61fd01a308bda18669db1d90637b579712718f35f37a6001f1c43c21cdce8
                                                          • Instruction Fuzzy Hash: A5313871D00119ABCF11AFA1CC85EEEBFB8FF08344F10406AF918B6162DB756916DB65
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 00486B17
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00486B53
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: 352ac0ade79c08b1e3711c999f417e7e9207a04fdee643833d7e2eb5d5c32766
                                                          • Instruction ID: c0acac3fdbca48a843832e92e86f2a53b54dc7fac4935119c3a772658612a1a1
                                                          • Opcode Fuzzy Hash: 352ac0ade79c08b1e3711c999f417e7e9207a04fdee643833d7e2eb5d5c32766
                                                          • Instruction Fuzzy Hash: B3318171100604AEDB10AF69CC41BFF73A9FF48754F11892EF9A5D7290DA34AC81CB68
                                                          APIs
                                                          • _memset.LIBCMT ref: 00462911
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0046294C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: 96bee15b93cabbe7b730b6a832175a1ae6e783472d86f40c3c4e5f0907898536
                                                          • Instruction ID: 2b4b8058b7b01795732b14ccdc08f7f24d6d082f06cc36c2997a609d376c2748
                                                          • Opcode Fuzzy Hash: 96bee15b93cabbe7b730b6a832175a1ae6e783472d86f40c3c4e5f0907898536
                                                          • Instruction Fuzzy Hash: BE31D871700705BBDB24DE48CE45BAFBBA4EF85350F14001AE881A6291E7B89948CB1B
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00486761
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0048676C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: 2599c693f4df458194b2d20bee318bb9363e3503390fb5a9e170622b8a8df8eb
                                                          • Instruction ID: 7937b7f8ceb80f7c2640562fc72fb2af059ad44b1fd006181b112b31544ba688
                                                          • Opcode Fuzzy Hash: 2599c693f4df458194b2d20bee318bb9363e3503390fb5a9e170622b8a8df8eb
                                                          • Instruction Fuzzy Hash: 9111B271200208AFEF51AF54DC81EAF376AEB48368F21092AF91897390D6399C5197A8
                                                          APIs
                                                            • Part of subcall function 00401D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00401D73
                                                            • Part of subcall function 00401D35: GetStockObject.GDI32(00000011), ref: 00401D87
                                                            • Part of subcall function 00401D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00401D91
                                                          • GetWindowRect.USER32(00000000,?), ref: 00486C71
                                                          • GetSysColor.USER32(00000012), ref: 00486C8B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: 9c6eecc6bf7be964b917928501c6ce077e485374675d84249056efc255601d24
                                                          • Instruction ID: 619ac3c59cbe9074ca3f8c975c7c8c691f8bfa66afa20d6a6bf36cd90ef0372b
                                                          • Opcode Fuzzy Hash: 9c6eecc6bf7be964b917928501c6ce077e485374675d84249056efc255601d24
                                                          • Instruction Fuzzy Hash: DC212CB2510209AFDF04EFA8CC45EEE7BA8FB08315F114A29FD55D2250D639E851DB64
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 004869A2
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004869B1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: dd0a91ca5e41458d40a7dd2483d9f0107040614a073402ee9870d4d63f33d5fa
                                                          • Instruction ID: c4dc0b7ee3ea423f7e1eb401844c401eee0777dcbcb5b463cc5485c74a1bef4f
                                                          • Opcode Fuzzy Hash: dd0a91ca5e41458d40a7dd2483d9f0107040614a073402ee9870d4d63f33d5fa
                                                          • Instruction Fuzzy Hash: A711B2B1100104ABEF506F68DC40EEF3769EB05378F614B29F964972E0C739DC919758
                                                          APIs
                                                          • _memset.LIBCMT ref: 00462A22
                                                          • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00462A41
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: 751c536b083c9adfecd4a8c2834bb49aa0f4764eac95f6b1a2dda81446ac4081
                                                          • Instruction ID: fa89ad59b694463807a05e008f151e0ce3f2ba89f6cc59c0a4ca2f54b8788f6f
                                                          • Opcode Fuzzy Hash: 751c536b083c9adfecd4a8c2834bb49aa0f4764eac95f6b1a2dda81446ac4081
                                                          • Instruction Fuzzy Hash: EA11B172A01915BACB30DA98DA44BDF73A8AB45304F044027E855B7290E7F8AD0AC79A
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0047222C
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00472255
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: 75e9458716a39df8dc3ccd06a53274ec1d022472b75fdff4666a046931244d06
                                                          • Instruction ID: 87a968fd796eb7ebd351e14a87864fbf4782faaabfad8c695b3487e96fec79d3
                                                          • Opcode Fuzzy Hash: 75e9458716a39df8dc3ccd06a53274ec1d022472b75fdff4666a046931244d06
                                                          • Instruction Fuzzy Hash: 2C113270101221BADB248F118D84EFBFBACFF0A351F10C66BF90892200D2B49881D6F9
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00403C14,004C52F8,?,?,?), ref: 0041096E
                                                            • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                          • _wcscat.LIBCMT ref: 00444CB7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: FullNamePath_memmove_wcscat
                                                          • String ID: SL
                                                          • API String ID: 257928180-181245872
                                                          • Opcode ID: 51d74b1989755c53183aee132601f2e45a628d82cf1f90107cdd3f9f5a0d9d06
                                                          • Instruction ID: 43824745660c3988bd5ee8fabd2b32f2c8f8042702d18c831ff1fab54f9b3e1b
                                                          • Opcode Fuzzy Hash: 51d74b1989755c53183aee132601f2e45a628d82cf1f90107cdd3f9f5a0d9d06
                                                          • Instruction Fuzzy Hash: ED118274A15208AACB40EB648945FDD77B8AF08354B0044ABB948E7291EAB8B6C4471D
                                                          APIs
                                                            • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                            • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00458E73
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: 9946c7197ab10ad9fde50dae1b7c0277909534bd518ba67c60e97b676ced7028
                                                          • Instruction ID: b8e2c670fbb7cccfe9550cd9997642be974785ccb83f9afd7f496d9e06e76b61
                                                          • Opcode Fuzzy Hash: 9946c7197ab10ad9fde50dae1b7c0277909534bd518ba67c60e97b676ced7028
                                                          • Instruction Fuzzy Hash: 4001F971601118ABCF14FBA1CC429FE7368EF01320B100A2FBC25772D2DE39580CC655
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock_memmove
                                                          • String ID: EA06
                                                          • API String ID: 1988441806-3962188686
                                                          • Opcode ID: 52e4c11e8ef934338f3706a5bab433cb38c03b7aa91e080fe40e6f8015fadc0b
                                                          • Instruction ID: 3cd15271acb3b06ac884f373c06a49f445b450121f82016c471601618c020999
                                                          • Opcode Fuzzy Hash: 52e4c11e8ef934338f3706a5bab433cb38c03b7aa91e080fe40e6f8015fadc0b
                                                          • Instruction Fuzzy Hash: 8F01F9719042287EDB18CAA9D816EFE7BFCDB11301F00459FF552D2181E878E6048764
                                                          APIs
                                                            • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                            • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00458D6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: d0242bd35a47d84e43d9a51d6d7b20f2831aa5b35d47bc754fff3bab3a4422aa
                                                          • Instruction ID: f717951ca8db0a39ae808ededaa33f35f94e61068a96ac8ac9a889606be0a7e6
                                                          • Opcode Fuzzy Hash: d0242bd35a47d84e43d9a51d6d7b20f2831aa5b35d47bc754fff3bab3a4422aa
                                                          • Instruction Fuzzy Hash: 1701B1B1A41108ABCF14EBA1C952AFF73A8DF15341F10042FB805772D2DE285E0CD67A
                                                          APIs
                                                            • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                            • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00458DEE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: ca68f18a7fa7c3bde14d10b92c765e559fdd9fc37852c13f41fffdb9c198d947
                                                          • Instruction ID: a21a4701c09283d063fe79b367182633aa51a9950eb7d0e2c1ab54a0e2954309
                                                          • Opcode Fuzzy Hash: ca68f18a7fa7c3bde14d10b92c765e559fdd9fc37852c13f41fffdb9c198d947
                                                          • Instruction Fuzzy Hash: 36018FB1A41109ABDB11EAA5C942AFF77A8DF11301F20052FBC05732D3DE295E1DD67A
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 0045C534
                                                            • Part of subcall function 0045C816: _memmove.LIBCMT ref: 0045C860
                                                            • Part of subcall function 0045C816: VariantInit.OLEAUT32(00000000), ref: 0045C882
                                                            • Part of subcall function 0045C816: VariantCopy.OLEAUT32(00000000,?), ref: 0045C88C
                                                          • VariantClear.OLEAUT32(?), ref: 0045C556
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: Variant$Init$ClearCopy_memmove
                                                          • String ID: d}K
                                                          • API String ID: 2932060187-3405784397
                                                          • Opcode ID: 9b1aca60acbf213d6da9471b2b02533c98583e4ee9509d3790eb0f545b09e1ee
                                                          • Instruction ID: 9b6b4eac42ae89553be157e2085c7612e92dc5081679660b2cee5bd476f3b436
                                                          • Opcode Fuzzy Hash: 9b1aca60acbf213d6da9471b2b02533c98583e4ee9509d3790eb0f545b09e1ee
                                                          • Instruction Fuzzy Hash: 401130B18007089FC710DFAAC8C089AF7F8FF18314B50852FE58AD7612E734AA48CB54
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp
                                                          • String ID: #32770
                                                          • API String ID: 2292705959-463685578
                                                          • Opcode ID: 9645843bb023f01be4ce20977d6b38402124eff568dd58de57c01e48d443021a
                                                          • Instruction ID: c10ae28a8aa268df33283df1156ce4f732750d60ee08a51e76ed462bd539b068
                                                          • Opcode Fuzzy Hash: 9645843bb023f01be4ce20977d6b38402124eff568dd58de57c01e48d443021a
                                                          • Instruction Fuzzy Hash: 91E0D13260023837E7209B55AC45FA7F7ACDB55B71F11006BFD04D3151D5649A45C7E5
                                                          APIs
                                                            • Part of subcall function 0043B314: _memset.LIBCMT ref: 0043B321
                                                            • Part of subcall function 00420940: InitializeCriticalSectionAndSpinCount.KERNEL32(004C4158,00000000,004C4144,0043B2F0,?,?,?,0040100A), ref: 00420945
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,0040100A), ref: 0043B2F4
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0040100A), ref: 0043B303
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0043B2FE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1406743218.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.1406696342.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1406908914.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407048855.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407156357.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407281714.0000000000527000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1407378770.000000000052E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_I3LPkQh2an.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 3158253471-631824599
                                                          • Opcode ID: 1d2e9604d48c8e7db41109c9ed8690ec6c36f65431277a35350cc55d3018cbc9
                                                          • Instruction ID: 2b780658d3da49ad9f9e4503d56df9c93059da648c8d5ac8478d33f484e7c10e
                                                          • Opcode Fuzzy Hash: 1d2e9604d48c8e7db41109c9ed8690ec6c36f65431277a35350cc55d3018cbc9
                                                          • Instruction Fuzzy Hash: 02E06DB02007208BD720AF29E5047467AE4EF14308F00897EE856C7341EBB8E488CBA9